01. Introduction to Ethical Hacking Flashcards
What is CONFIDENTIALITY?
Assurance that the information is accessible only to those authorised to have access.
What is INTEGRITY?
The trustworthiness of data or resources in terms of preventing improper or unauthorised changes.
What is AVAILABILITY?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is AUTHENTICITY?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is NON-REPUDIATION?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is the ATTACK EQUATION?
Attacks = Motive + Method + Vulnerability
What are PASSIVE ATTACKS?
Passive attacks do not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network.
Examples: Sniffing, Eavesdropping, Network Traffic Analysis
What are ACTIVE ATTACKS?
Active attacks tamper with the data in transit or disrupt the communication or services between the systems to bypass or break into secured systems.
Examples: DoS, Man-in-the-Middle, Session Hijacking and SQL Injection
What are CLOSE-IN ATTACKS?
Close-in attacks are performed when the attacker is in close physical proximity with the target system or network in order to gather, modify, or disrupt access to information.
Examples: Social Engineering such as Eavesdropping, Shoulder Surfing, and Dumpster Diving
What are INSIDER ATTACKS?
Insider attacks involve using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems.
Examples: Theft of physical devices, Planting Keyloggers, Backdoors, Malware
What are DISTRIBUTION ATTACKS?
Distribution attacks occur when attackers tamper with hardware or software prior to installation.
Examples: Attackers tampering with hardware (or software) at its source or in transit
What are three examples of OFFENSIVE WARFARE?
Web Application Attacks, Web Server Attacks, Malware Attacks, MITM Attacks, System Hacking
What is DEFENSIVE INFORMATON WARFARE?
Refers to all strategies and actions designed to defend against attacks on ICT assets.
What are three examples of DEFENSIVE WARFARE?
Prevention, Deterrence, Alerts, Detection, Emergency Preparedness, Response
What is OFFENSIVE INFORMATION WARFARE?
Refers to information warfare that involves attacks against the ICT assets of an opponent.
What is the CEH HACKING METHODOLOGY? (CHM)
Footprinting, Scanning, (Enumeration, Vulnerability Analysis), Gaining Access (Cracking Passwords, Vulnerability Exploitation), (Escalating Privileges), Maintaining Access (Executing Applications, Hiding Files), Clearing Logs (Covering Tracks)