Security Flashcards
CIA triad
Confidentiality like encryption
Integrity like hashing
Availability like uptime or redundancy
Non-compliant System
System that is not compliant with the configuration baseline of what is approved by the organization
Configuration baseline
set of recommendations for deploying a computer in a hardened configuration
Unprotected System
system not protected by any antivirus or firewall
Unpatched System
system without patches or updates applied even though they are available
What are some Windows releases that are EOL as of 2023?
Windows XP
Windows Vista
Windows 7
Bring Your Own Device (BYOD)
Use of personal devices in an office environment
Zero-day Exploit
unknown exploit that exposes previously unknown vulnerabilities
Denial of Service (DOS)
attack that attempts to make a computer or server’s resources unavailable
Flood Attack
type of DoS that attempts to send more packets to a server or host than it can handle
Ping Flood
Flood attack that happens when too many pings (ICMP echo) are being sent
SYN Flood
Attacker initiates multiple TCP sessions but never completes the three-way handshake
Permanent Denial of Service (PDoS)
attack that exploits a security flaw to permanently break a networking device by reflashing its firmware
Fork Bomb
attack that creates a large number of processes to use up the available processing power of a computer. It is not considered a “worm” because it does not infect the programs.
Distributed Denial of Service (DDoS)
uses lots of machines to attack a server to create a DoS
DNS Amplification
the attacker typically uses a botnet or a group of compromised computers to send a large number of DNS queries to open DNS resolvers. The source IP address of these queries is spoofed on the hackers machine to make it look like they are coming from the victim’s IP address. When the open DNS resolvers respond to these queries, the response is sent to the spoofed source IP address, which is the victim’s IP address. Because the response is typically much larger than the original query, this can overwhelm the victim’s network and cause a denial of service.
Blackhole/Sinkhole
identifies attacking IP addresses and routes them to a non-existent server through the null interface
Spoofing
occurs when an attacker masquerades as another person by falsifying their identity
ARP Spoofing/”Poisoning”
sending fake ARP messages to a local netowkr in order to associate a fake MAC address with a legitimate IP address, thereby intercepting network traffic intended for the legitimate device.
On-Path Attack
occurs when an attacker puts themself between the victim and the intended destination
Replay
occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and then repeated. an example is capturing someone’s log-in credentials and storing it, and then logging into their account later on in the day.
Relay attack
when the attacker inserts themself in between the two hosts and intercepts legitimate communication but relaying the information to a C2 or 3rd party.
SSL Stripping
when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection
Downgrade Attack
when an attacker attempts to have a client or server abandon a higher security mode in favor of a lower security mode by intercepting the communication between two systems that are negotiating the protocol version to be used, and then modifying the negotiation messages to suggest an older and less secure protocol version.