Slides Flashcards
(156 cards)
Insider threat
Someone who intentionally misused access to negatively effect network
Insider threat methods
- Plant logic bombs
- Open backdoors
- Steal
- Attack internal resources
Insider threat warning signs
- Greed
- Introvertversion (outside of normal behavior)
- Financial hardship
- Vulnerability of blackmail
- Reduced loyalty to the United States
- Destructive, narcissistic behavior
Insider threat detection and prevention techniques
- Encryption
- Data loss prevention
- Data access monitoring
- Log analysis
- Data redaction
- Data access control
Data/file encryption
Ensures integrity and confidentiality of data
Data Loss Prevention
Protects data be providing information about how data is used
Data Access Monitoring
Identifies who is accessing what
Log Analysis
Can determine abnormal events
Data Redaction
Removing sensitive data from media
What are the types of access control?
- Discretionary access control
- Mandatory access control
- Role-based access control
Discretional Access Control (DAC)
Only those specified by the owner
Mandatory Access Control (MAC)
Decisions made by cental authority
What type of access control is based on what a user does in an organization?
Role-based access control
What is it called when a criminal encrypts data on a computer and demands money for access?
Ransomware
What is one of the fastest growing malware threats?
Ransomware
What are attacks delivered via WiFi, Ethernet, RF, Bluetooth?
Remote direct attacks
What delivers attacks through a legitimate looking website, targets vulnerabilities in the browser and associated software and is an attack of opportunity?
Drive-by attack
What is a focused drive-by attack called?
Watering hole
What is malicious content embedded in a webpage?
IFrame Redirect
What are web-based threats?
- Drive-by attacks
- Watering hole
- IFrame redirect
- Fake login pages
- Browser plug-in and script based exploits
- SQL injection
- SEO poisoning
What is web based code executed locally to deliver enhanced content to users and uses mostly JavaScript and VBscript?
Browser plug-in and script based exploits
What is called when attackers manipulate Search Engine Optimization to put their malicious sites high up in search engineer results, is often times legit website controlled by actor, and is very effective against enterprise networks/users?
SEO poisoning
What is the act of entering false information into a DNS cache in order to redirect to a malicious website?
DNS cache poisoning
What is called when an attacker uses legitimate credentials to move within the network with no need for plain text passwords and uses Windows Server Message Block (SMB) to login with password hash?
Pass-the-hash