Misc Flashcards

1
Q

CIAAN: C?

A

Confidentiality, only authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIAAN: I?

A

Integrity, the message is not manipulated, unchanged, no MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIAAN: AA?

A

Availability: If the message is not available, it can’t be read.

EX. servers need to be up.

Authenticity: A genuine message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIAAN: N?

A

Non-repudiation: The sent message can’t be denied at a later stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacker role: Red Team?

A

Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacker role: Blue Team?

A

Defenders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacker role: Purple team?

A

A mix of attackers and defenders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 2 attack types?

A

Targeted attack / planned attack

Opportunistic attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a supply chain attack?

A

Attack on a customer to a customer to reach the final goal.

Domino effect hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker value?

A

Political power, money, information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital warfare?

A

Espionage, vote manipulation, behaviour modification of people online, spreading misinformation, attack infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in depth?

A

Holistic security. Secure the least secure first then moving to the next least secure and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero trust?

A

Minimize security holes though thinking that everything is unsecure. EX. Do not give access levels to those who do not explicitly needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Triangle of security?

A

Security, Function and user experience. The sweet spot is very situational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethics and moral?

A
Thou shall only do:
What is legal.
What you have permission to do.
With a good cause.
Without destroying anything.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Responsible disclosure?

A

In case of a found vulnerability, please disclose responsibly! Make public no less than 90 days later. In the meantime, inform the affected party.

17
Q

Risks and the weakest link?

List three things.

A

Many risks and vulnerabilities shouldn’t exist and is easily avoidable.

Humans are always the weakest link.

Education of staff is important.

18
Q

Risk equation?

A

Risk = (Threat x Vulnerability) x Consequence

Probability

19
Q

What is defined as a Risk?

A

The possibility of hurting consequences.

20
Q

Threat?

A

The planning of executing drastic measures or violence.

21
Q

What is a vulnerability?

A

Something that exposes a system to attack.

22
Q

Risk management options?

A

Avoid
Minimize
Move the responsibility
Accept

23
Q

Imagined threats vs factual threats?

A

Both is relevant. Related to safety, knowledge, staff education.

24
Q

Hacker philosophy?

A

Use a hacker’s mindset (Attacker viewpoint)

25
Q

What is important regarding risk management?

List 4 things.

A
  1. Define risks in an organization
    Identify business critical risks
  2. Brainstorm all risk scenarios, also the “impossible”, then prioritize them.
  3. Involve every relevant staff
  4. Risk analysis is not a one-time thing. It’s an ongoing process.
26
Q

Risk analysis quotes?

A

“It is better to remove a risk from the list than finding it when it is too late”

“Take decisions based on facts, instead of assumptions”

“Look beyond company policies and procedures, Hackers will do exactly that!”

27
Q

Policy for hackers?

A

Be mindful of explaining risks to decisionmakers.

If we don’t follow policies, risks emerges.

28
Q

What is the steps of a regular pentest?

5 steps.

A
  1. Recon & footprinting
  2. Scanning & enumeration
  3. Gaining access / run exploit
  4. Maintaining access / install backdoor
  5. Covering steps / manipulate logs