2. Threats, Vulnerabilities, Mitigations Flashcards

1
Q

2.1 Shadow IT

A

unapproved IT operations, introduces new system risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.1 list of motivations for threat actors

A
  • data exfiltration
  • espionage
  • service disruption
  • blackmail
  • financial gain
  • philosophical beliefs
  • ethical
  • revenge
  • disruption/chaos
  • war
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2.2 email attack surfaces and threat vectors

A

unprotected account, poorly configured filter, user unawareness

threat vectors: phishing, malware attachments, email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2.2 smishing

A

SMS phish, fraudulent SMS messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2.2 vectors and surfaces for IM

A

social engineering, malicious link, file transfer, unsecured account, bad security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2.2 file-based vectors

A

malware, macros, email attachments, file sharing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2.2 Vishing

A

Voice call impersonating legitimate entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2.2 Attack surface vs. threat vector

A

a surface is an area where exploit is possible (USB port, landline network) whereas a vector is the method of attack (infected USB, Vishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2.2 MSP

A

Managed Service Provider

Vectors: insider threat, stealing client network data, supply chain infiltration

Surfaces: remote management tools, client network, third party software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2.2 pretext

A

attacker creates a fabricated scenario to trick the victim (urgency or authority figure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2.2 watering hole

A

website that is visited frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2.3 Race Conditions

A

TOCTOU
(Time of Check, Time of Use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2.3 Resource reuse vulnerability

A

sensitive info not removed from a resource before it is reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2.3 Mobile vulnerability

A

Sideloading
Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2.4 Virus

A

attaches itself to a legit programs and spreads to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.4 Bloatware

A

consumes excessive resources

17
Q

2.4 Logic Bomb

A

code that triggers harmful action when certain conditions are met

18
Q

2.4 PUP

A

Potentially Unwanted Program

usually downloaded by accident, or is bundled with a safe software. Acts as a spyware

19
Q

2.4 Keylogger

A

records keystrokes to capture sensitive information

20
Q

2.4 RFID cloning

A

attacker captures an RFID tag with an RFID reader and clones it, giving them unauthorized access. RFID is like a swipe access card into a building

21
Q

2.4 Types of DDoS attacks

A

Amplified
Reflected

22
Q

2.4 Types of DNS attacks

A

Spoofing/Poisoning
Tunneling

23
Q

2.4 Types of Wireless Attacks

A

Evil Twin
WEP/WPA cracking
Deauthentication attack

24
Q

2.4 HIPS

A

host-based intrusion prevention system