1.1_ Cybersecurity Mindset Flashcards

Defining Cybersecurity Defining Attack Strategies Website Attacks Server Attacks Database Attacks NIST Cybersecurity Framework

1
Q

What are the two concepts cybersecurity is centered on?

A
  1. Threat assessment- what can happen A structured process of identifying the risks posed to a group
  2. Risk mitigation (what are you going to do about it) Systematic reduction of the impact and/or likely occurrence of a negative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain:

Social Engineering

A

The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by gaining confidence and trust.

Example: An attacker calls and claims to be from your internet provider (this is an example of vishing, or voice phishing) and asks you questions about your account, aiming to trick you into giving account information or login credentials (credential reuse).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain:

Phishing

A

A technique for attempting to acquire sensitive data, such as credit card numbers, usernames, or passwords, through fraudulent solicitation (e.g., email). The perpetrator pretends to be a reputable business or person.

Example: During the World Cup in Russia, scammers sent out phishing emails to fans offering free trips, in order to access personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain:

Man-in-middle attack (MitM)

A

An attack where the adversary positions themself between the user and the system so that they can intercept and alter data traveling between them.

Example:
We download and update software daily. A remote hacker can use the lack of integrity verification (e.g., hash value) of downloads or update information to manipulate a software package with an MitM attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain:

Stolen Hardware

A

A hacker can simply steal a computer and use the saved credentials to login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain:

Brute Force Attack

A

A hacker can use a brute force attack to continuously attempt username and password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain:

Code-injection

A

A hacker can use a code-injection attack in which malicious code is directly injected into the username or password fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain:

Faulty Session Management

A

A hacker can exploit faulty session management when developers incorrectly implement code used to maintain login and logouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain:

Malware

A

Hardware, software, or firmware meant to perform an unauthorized process that will compromise the confidentiality, integrity, or availability of a system (e.g., a virus, worm, Trojan horse, or other code-based entity that infects a host).

Example: In May of 2017, the WannaCry worm spread rapidly across a number of computer networks, infecting Windows computers. It encrypts files on the machine’s hard drive and demands a ransom payment in Bitcoin in exchange for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain:

Default Credentials

A

Database management systems often come with default credentials, which might be left unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain:

Unpatched Database

A

Database management systems might be unpatched against publicly known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Lack of Segregation mean?

A

The database might be set up to let a client look at another client’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the NIST Cybersecuirty framework?

A

IDENTIFY > PROTECT > DETECT > RESPOND> RECOVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain:

Packet sniffer

A

Software that monitors network traffic on wired or wireless networks and captures packets. Packet sniffers are used by network managers to monitor and analyze traffic, but hackers also use them.

Example: A user downloads a file from the internet. The file is a packet sniffer that, when installed on the network, can record and transmit any data to a hacker’s command and control server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain:

Code injection:

A

Type of attack that injects code that is then interpreted and executed by the target application.

Example: HTML injections are used to change a website or to steal personal identifiable information (PII). HTML injections can occur via a website link, data, or input fields on web forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain:

Keylogger*

A

A program designed to record which keys are pressed on your computer keyboard. It can obtain passwords or encryption keys and use these to bypass security measures.

Example: ZeuS/Zbot is a modular banking Trojan which uses keystroke logging to record credentials when a user visits a banking website.

17
Q

Explain:

Risk mitigation

A

The process of reducing the impact of a negative event, and/or the likelihood that it will reoccur.

Example: Reducing the risks associated with signals from wireless access points that transmit beyond an organization’s controlled boundaries. One mitigation action is to reduce the power of wireless transmissions so that signals are less likely to extend beyond the organization’s physical perimeters.

18
Q

Explain:

Threat assessment

A

A structured process of identifying the risks posed to a group or system.

Example: The National Institute of Standards and Technology outlines structured processes and frameworks for identifying, estimating, and prioritizing risks to individual, organizational and operational assets. (NIST Special Publication 800-30)