01. Introduction to Ethical Hacking Flashcards

1
Q

What is CONFIDENTIALITY?

A

Assurance that the information is accessible only to those authorised to have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is INTEGRITY?

A

The trustworthiness of data or resources in terms of preventing improper or unauthorised changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is AVAILABILITY?

A

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AUTHENTICITY?

A

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is NON-REPUDIATION?

A

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the ATTACK EQUATION?

A

Attacks = Motive + Method + Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are PASSIVE ATTACKS?

A

Passive attacks do not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network.
Examples: Sniffing, Eavesdropping, Network Traffic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ACTIVE ATTACKS?

A

Active attacks tamper with the data in transit or disrupt the communication or services between the systems to bypass or break into secured systems.
Examples: DoS, Man-in-the-Middle, Session Hijacking and SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are CLOSE-IN ATTACKS?

A

Close-in attacks are performed when the attacker is in close physical proximity with the target system or network in order to gather, modify, or disrupt access to information.
Examples: Social Engineering such as Eavesdropping, Shoulder Surfing, and Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are INSIDER ATTACKS?

A

Insider attacks involve using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems.
Examples: Theft of physical devices, Planting Keyloggers, Backdoors, Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are DISTRIBUTION ATTACKS?

A

Distribution attacks occur when attackers tamper with hardware or software prior to installation.
Examples: Attackers tampering with hardware (or software) at its source or in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are three examples of OFFENSIVE WARFARE?

A

Web Application Attacks, Web Server Attacks, Malware Attacks, MITM Attacks, System Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DEFENSIVE INFORMATON WARFARE?

A

Refers to all strategies and actions designed to defend against attacks on ICT assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three examples of DEFENSIVE WARFARE?

A

Prevention, Deterrence, Alerts, Detection, Emergency Preparedness, Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is OFFENSIVE INFORMATION WARFARE?

A

Refers to information warfare that involves attacks against the ICT assets of an opponent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the CEH HACKING METHODOLOGY? (CHM)

A

Footprinting, Scanning, (Enumeration, Vulnerability Analysis), Gaining Access (Cracking Passwords, Vulnerability Exploitation), (Escalating Privileges), Maintaining Access (Executing Applications, Hiding Files), Clearing Logs (Covering Tracks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the CYBER KILL CHAIN METHODOLOGY?

A

Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives

18
Q

Define the CYBER KILL CHAIN METHODOLOGY.

A

The cyber kill chain methodology is a component of intelligence-driven defense for the identification and prevention of malicious intrusion activities. It provides greater insight into attack phases, which helps security professionals to understand the adversary’s tactics, techniques, and procedures beforehand.

19
Q

What are TACTICS, TECHNIQUES, and PROCEDURES?

A

Tactics, Techniques, and Procedures (TTPs) refers to the patterns of activities and methods associated with specific threat actors or groups of threat actors.

20
Q

What are TACTICS? (TTP)

A

“Tactics” are the guidelines that describe the way an attacker performs the attack from beginning to the end.

21
Q

What are TECHNIQUES? (TTP)

A

“Techniques” are the technical methods used by an attacker to achieve intermediate results during the attack.

22
Q

What are PROCEDURES? (TTP)

A

“Procedures” are organizational approaches that threat actors follow to launch an attack.

23
Q

What is the MITRE ATT&CK FRAMEWORK? (PRE-ATT&CK and ENTERPRISE)

A

Reconnaissance, Weaponise, Deliver, Exploit, Control, Execute, Maintain

24
Q

Define the MITRE ATT&CK FRAMEWORK.

A

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, government, and the cybersecurity product and service community. The 14 tactic categories within ATT&CK for Enterprise are derived from the later stages (exploit, control, maintain, and execute) of the seven stages of the Cyber Kill Chain.

25
Q

What are the four meta-features of the DIAMOND MODEL OF INTRUSION ANALYSIS?

A

Adversary (An opponent who was behind the attack), Victim (The target that has been exploited or where the attack was performed), Capability (The attack strategies or how the attack was performed), Infrastructure (What the adversary used the reach the victim)

26
Q

What is HACKING?

A

Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to a system’s resources. It involves modifying system or application features to achieve a goal outside of the creator’s original purpose. Hacking can be used to steal and redistribute intellectual property, leading to business loss

27
Q

What is a HACKER?

A

An intelligent individual with excellent computer skills who can create and explore computer software and hardware. Some hack with malicious intent such as to steal business data, credit card information, social security numbers, email passwords, and other sensitive data.

28
Q

What are BLACK HATS?

A

Individuals with extraordinary computing skills; they resort to malicious or destructive activities and are also known as crackers.

29
Q

What are WHITE HATS?

A

Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner.

30
Q

What are GREY HATS?

A

Individuals who work both offensively and defensively at various times.

31
Q

What are SUICIDE HACKERS?

A

Individuals who aim to bring down the critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment.

32
Q

What are SCRIPT KIDDIES?

A

An unskilled hacker who compromises a system by running scripts, tools, and software that were developed by real hackers.

33
Q

What are CYBER TERRORISTS?

A

Individuals with wide range of skills who are motivated by religious or political beliefs to create fear through the large-scale disruption of computer networks.

34
Q

What are STATE-SPONSORED HACKERS?

A

Individuals employed by the government to penetrate and gain top-secret information from and do damage to the information systems of other governments.

35
Q

What are HACKTIVISTS?

A

Individuals who promote a political agenda by hacking, especially by using hacking to deface or disable website.

36
Q

What are HACKER TEAMS?

A

A consortium of skilled hackers having their own resources and funding. They work together in synergy for researching the state-of-the-art technologies.

37
Q

What are INDUSTRIAL SPIES?

A

Individuals who perform corporate espionage by illegally spying on competitor organizations and focus on stealing information such as blueprints and formulas.

38
Q

What is an INSIDER?

A

Any trusted person who has access to critical assets of an organization. They use privileged access to violate rules or intentionally cause harm to the organization’s information system.

39
Q

What are CRIMINAL SYNDICATES?

A

Groups of individuals that are involved in organized, planned, and prolonged criminal activities. They illegally embezzle money by performing sophisticated cyber-attacks.

40
Q

What are ORGANISED HACKERS?

A

Miscreants or hardened criminals who use rented devices or botnets to perform various cyber-attacks to pilfer money from victims.

41
Q

What is ETHICAL HACKING?

A

Ethical hacking involves the use of hacking tools, tricks, and techniques to identify vulnerabilities and ensure system security. It focuses on simulating the techniques used by attackers to verify the existence of exploitable vulnerabilities in a system’s security. Ethical hackers perform security assessments for an organization with the permission of concerned authorities.