Module 02 - Threats, Vulnerabilities, and Mitigations Flashcards

(73 cards)

1
Q

What are the attack types?

A

Opportunistic and unstructured
Targeted and structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s shadow IT?

A

Is the use of unapproved or unsanctioned technology in a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the attributes of threat actors? Define the attributes

A

Internal/External => Degree of access of the actor
Sophistication/Capability => Ability to attack
Resources/Funding => Support to the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the general strategies of threat actors?

A
  1. Service disruption
  2. Data exfiltration
  3. Disinformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the motivations of threat actors?

A
  1. Chaotic motivation
  2. Financial motivation
  3. Political motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of attack could be done when there’s a financial motivation?

A
  1. Blackmail
  2. Extortion
  3. Fraud
  4. Commercial espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between Blackmail and Extortion?

A

Blackmail is when trying to prevent the release of confidential information.
Extortion is trying to prevent some type of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the threat actor types?

A
  1. Hackers
  2. Unskilled hackers [Script Kiddie]
  3. Hacker groups [Hacktivists]
  4. Nation-state actors [APT]
  5. Organized crime
  6. Internal [Whitleblower]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronym:
APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a whistleblower?

A

Internal threat actor with an political motivation to release confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps of an attack?

A
  1. Reconnaissance
  2. Social Engineering
  3. Technical approaches
  4. Breach the system
  5. Escalate privilege
  6. Backdoor
  7. Stage computers
  8. Exploit vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s reconnaissance?

A

The process of gathering information about an organization, its users, hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s Social Engineering?

A

The process of manipulating others into providing sensitive information or doing unauthorized procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s to stage computers?

A

The process of preparing computers to perform additional tasks in the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List:
Defense security concepts

A
  1. Layering [Defense in depth]
  2. Principle of least privilege
  3. Variety
  4. Randomness
  5. Simplicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the concept of layering (Defense in depth)

A

It’s the implementation of multiple security strategies to protect the same asset.

If one is bypassed, there’s multiple others to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define the concept of Variety

A

It’s the variety of methods in defensive layers, for the multiple use of the same method isn’t secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define the concept of ‘Principle of least privilege’

A

Users have only the access they need to do their jobs and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define the concept of ‘Radomness’

A

Constant change in personal habits, passwords, in order do prevent predictability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s an attack surface?

A

Potential vector for attempting an intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can vulnerabilities be exploited?

A

Remote and local.

Remote are exploited unauthenticated
Local are exploited with valid credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s a secure network?

A

Identifies, authenticate, authorize and audit network users, hosts and traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s a threat vector?

A

A path an attacker might use to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the difference between threat vector and attack vector?

A

Threat vector is the potential path of an attack.
Attack vector is the path used in a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
What are the attack vector types?
1. Vulnerable software 2. Network vector 3. Lure-based vector 4. Message-based vectors 5. Supply chain 6. Human vector
21
What are the network vectors?
1. Direct access (physical) 2. Wired network 3. Remote network 4. Cloud access 5. Bluetooth network 6. Default credentials 7. Open service ports
21
What is the 'Cloud access' network vector?
The compromise of an administrative cloud account
21
What's the 'Direct access' network vector?
It's the compromise the physical place where network devices are
21
What's the 'Wired network' network vector?
The attaching of unauthorized devices to the physical network, with permitted communication
21
What's the 'Open service port' network vector?
Being able to establish a unauthenticated connection in a TCP, or UDP, port
21
What are lure-based vectors?
Are vectors that are attractive and fools users to go for it
21
What's a drop attack?
Threat actor leaves infected USB sticks on the floor, waiting one employee to plug it into a computer, initiating an attack
22
What are message-based vectors?
The sending of infected files within messages that tricks users into opening. [Phising]
23
What's the attack surface of message based vectors?
1. Email 2. Short Message Service - SMS 3. Instant Messaging - IM 4. Web and social media
23
What'a zero-click exploit?
It's an exploit triggered by no user action.
24
What's a supply chain?
End-to-end process of designing, manufacturing and distributing goods or services to customers
25
What's a 'procurement management' process?
The process of ensuring reliable sources are in the supply chain
26
What's social engineering?
Means of extracting information or to perform actions through the human factor.
27
What are the manipulation techniques?
01. Moral obligation 02. Innate human trust 03. Threatening 04. Very little to nothing 05. Ignorance 06. Authority and fear 07. Social proof 08. Scarcity 09. Likeability 10. Urgency 11. Common ground
28
What is the social engineering process?
1. Research 2. Development 2.1 Selecting individuals 2.2 Relating to the targets 3. Exploitation
29
What's footprinting?
The process of extracting information on any resource available
30
What are the social engineering techniques?
1. Impersonation and pretexting 2. Phishing and pharming 3. Typosquatting 4. Brand impersonation and disinformation
31
What's a business email compromise?
It's a sophisticated phishing attack where a valid account of vendor are spoofed or compromised.
32
What's the difference between disinformation and misinformation?
Disinformation is when the purpose is to deceive. Misinformation is repeating false information without the intent to deceive.
33
What's a watering hole attack?
The compromise of a third-party resource used by the target's system or by it's employees. (Supply chain attack)
34
What's a malware?
Software that does "bad things" in the system from the owner's perspective
35
What are the types of malware?
1. Virus and worms 2. Trojans 3. PUP/PUA
36
What's a virus?
It's a type of malware designed to replicate and spread from computer to computer, executed only when a user performs an action
37
What are the types of viruses?
1. Non-resident 2. Memory resident 3. Boot 4. Script and macro 5. Fileless
38
What's a polymorphic virus?
Virus that dynamically change, or obfuscate, their code to evade detection
39
What's a multipartite virus?
Viruses that use multiple vectors
40
What's a worm?
Virus that replicates and runs withou user intervention
41
Acronym: AVT
Advanced Volatile Threat
42
What's a AVT or APT virus kind?
It's a fileless and live-off-the-land malware.
43
What's a spyware?
Malware that spies on the target's system
44
What are the most common spyware kinds of virus?
1. Adware 2. Keylogger 3. Tracking cookies 4. Supercookies 5. Beacons
45
What's a supercookie [Spyware]?
It's the storing of tracking data without declaring or through header requests
46
What are beacons [Spyware]?
Single-pixel image embedded into a site; When loaded, footprints, collects metadata and could even run scripts
47
What's a backdoor?
Access method that circumvents the usual authentication method.
48
Acronym: RAT
Remote Access Trojan
49
What's a RAT - Remote Access Trojan?
Backdoor malware that pretends to be a legitimate program
50
What's a zombie? In the context of RATs
A host controlled by a RAT
51
What's a botnet?
A group of computers under the control of the same malware instance.
52
Acronym: What C2 or C&C?
Command and Control
53
What's a Command and Control
Infrastructure of hosts and services where attacker distributes, direct and controls malwares over botnets
54
What are the commonly used protocols in C2?
IRC, HTTP and DNS
55
Acronym: IRC [Protocol]
Internet Relay Chat
56
What's a rootkit?
Malware that runs with highest privilege on a system
57
What's a ransomware?
Extorts money from victims by making devices, or data, unavailable and demanding payment.
58
What's crypto-ransomware?
Ransomware that encrypts the data, the private encryption key is held by the attacker
59
What's a cryptojacking malware?
Steals physical resources to mine cryptocurrency.
60
What's a logic bomb?
Malicious code that waits a trigger to be executed.
61
What are good strategies in malware prevention?
1. Patches 2. Anti-malware soluctions 3. Browser settings 4. Firewall 5. Training 6. Web filter