A3 Flashcards

1
Q

What is a covert channel?

A

A channel that is not known by the organization.
Mechanisms used to transmit data using methods not originally intended for data transmission by the system designers. These channels violate the entity’s security policy but do not exceed the entity’s access authorization, so they can communicate data in small parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a replay attack?

A

Someone eavesdrops on someone, and they collect information that can later be used/replayed to gain access.
A type of man-in-the-middle (MITM) attack in which a cybercriminal eavesdrops on a secure network communication, intercepts it, and then “replays” the message at a later time to the intended target to gain access to the network and the data that is behind the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a return-oriented attack?

A

A gadget that is attached to the system and returns information once it is done.
A sophisticated technique that utilizes pieces of legitimate original system code (each a gadget) in a sequence to perform operations useful to the attacker. Each gadget ends with a “return” instruction causing the next gadget to execute and carry out complex operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is race conditions?

A

They force an application to perform two operations at the same time so the program can freeze.
An attacker exploits a system or application that relies on a specific sequence of operations. By forcing the application to perform two or more operations out of order or simultaneously, an attacker may gain unauthorized access or execute a fraudulent act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a state sponsored actor?

A

Someone funded by the nation to steel and exfiltrate intellectual property, sensitive information, and even funds to further their nation’s espionage causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Malware?

A

Software or firmware intended to perform unauthorized processes that have an adverse impact on the confidentiality, integrity, or availability of an information system. Common examples include viruses, worms, Trojan horses, adware, spyware, and other code-based programs that infect a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNS spoofing?

A

A spoofing attack that involves a perpetrator modifying the domain-name-to-IP address mapping known as the Domain Name System (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Rogue mobile apps?

A

Malicious apps that appear legitimate. A fraudulent party creates a mobile application that is installed by a victim unsuspectingly and that app then steals information, gives the attacker unauthorized access, or executes some other malicious act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spear phishing?

A

Social engineering attack in which employees in a corporate entity are targeted by posing as a legitimate department or employee, such as human resources or the IT director.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a mobile code cyberattack?

A

Software program designed to move from computer to computer to “infect” other applications by altering them in some way to include a version of the code. Malicious mobile code is often known as a virus, and a polymorphic virus is one such variety in which the code mutates by changing its structure to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is denial of service attack?

A

A scheme in which cybercriminals flood a company’s network with so much traffic that it is unable to respond to service requests or sustain normal network operations. Excessive volume will prevent web servers from being able to support user requests on a web page, causing customers to be unable to navigate a company’s site or make purchases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Brute force attack?

A

Password-cracking scheme that involves an attacker using an automated program to guess a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Port scanning attack?

A

Occurs when an attacker scans for open logical ports that can be used to find vulnerabilities or entry points into a company’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

An attack typically coming in the form of malware that locks a user or a company’s operating systems, applications, and ability to access data unless a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Watering hole?

A

Fraudsters identify websites of suppliers, customers, or regulatory entities that are known to be used by several companies or even entire industries.

17
Q

What does business email compromise do?

A

Affects the flow of payments.

18
Q

What is additional industry exposure risk?

A

The worry that by working with another company you are exposed to their risks.

19
Q

What is loss of control?

A

When a company doesn’t have control of a sector of their company because they outsourced it.

20
Q

What is compliance violation?

A

When a company outsource a service to another and is worried that that company does not have compliance with the same cybersecurity they do.

21
Q

What is escalated cyberattack?

A

When a hacker enters into one system and then spreads into others for example a smart fridge and then a computer.

22
Q

Device spoofing?

A

The creation of a fake device in the attempt to connect to a company’s network.

23
Q

What is Internet of things (loT)?

A

Focuses on cyberattacks that are directed by the use of a fake device or non-essential devises like a smart fridge or cameras etc.

24
Q

What is reduction analysis?

A

Decomposing the asset being protected from the threat. The intent is to gain a greater understanding of how the asset interacts with potential threats, whether it’s a system, application, or network.

25
Q

What are the components of a successful security awareness program?

A

Phishing simulations
Security program champions
Regulatory employee engagement (training)
Metrics to measure program success