Attacks and Threats (Lecture 6) Flashcards

1
Q

In identifying threats, what 4 key areas are broken down for assessment?

A

Hard Assets

Soft Assets

Threat Actors

Third Parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some hard assets

A
Servers
Computers
Mobile Devices
Access Points
Routers
Firewalls
Server Rooms & Data Centres
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some soft assets

A
Databases
Software
Personal data
Intellectual Property
Research
Employees
Reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List types of threat actors ‘bad actors’, ‘Hackers’ or ‘Attackers’

A
Insider threats
Activist groups
Competitors
Disgruntled Customers
Accidental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some third parties (includes any third party organisations with system access

A

Supply Chain Organisations

Customers

Consultants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a cyber attack and a cyber threat

A

A cyber attack is the deliberate exploitation of computer systems, technology-dependent enterprises and networks

Must be knowingly malicious and have victims

A cyber threat is any action which results in the compromise of confidentiality, availability and/or integrity of data or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an attack surface?

A

It is the area of exposure to a given threat. Vary in size and availability to attack sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network attack surface?

A

Vulnerabilities over an enterprise network, WAN or Internet

Network protocol vulnerabilities, such as those used for a DoS attack, disruption of communication links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a software attack surface?

A

Vulnerabilities in application, utility or operating system code

Web-based applications are an example of a large software attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a human attack surface?

A

Vulnerabilities created by personnel or outsiders, such as social engineering, human error and trusted insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 4 types (methods) of cyber attack

A

Interruption- DoS or DDoS attack, Ransomware

Interception - Sniffing

Modification - Man-in-the-middle, persistence

Fabrication - Invoice Fraud, Russian Bride, Stocks and Shares, Spanish Prisoner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does S.T.R.I.D.E stand for?

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege

Microsoft developed threat categorisation scheme

Help to ensure all potential threats have been reviewed for each asset type and attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spoofing

A

An attack with the goal of gaining access to a target system using a falsified identity. When attackers spoof their identity as valid they can bypass filters and other defences

Used against IP and MAC addresses, usernames, security names, Wireless network SSID’s, email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is tampering?

A

Any action resulting in the unauthorised changes or manipulation of data, whether in storage or transit

Used to falsify communications or alter static information

violates integrity as well as availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is repudiation?

A

The ability for a user or attacker to deny having performed an action or activity

Often attackers engage in repudiation attacks to maintain plausible deniability so as to not be held accountable

Can also result in innocent third parties being blamed for violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is information disclosure?

A

The revelation or distribution of private, confidential or controlled information to external or unauthorised entities

Can include customer identity information, financial information or proprietary business operation details

Takes advantage of system design and implementation mistakes
(Failing to remove debugging code, leaving sample applications or test accounts

17
Q

What is DoS and DDoS?

A

An attack that attempts to prevent authorised/legitimate use of a resource

Can be done through flaw exploitation, connection overloading or traffic flooding

Does not necessarily result in full interruption to a resource. Could reduce throughput or introduce latency to hamper productive use of a resource

DoS attack originates from single machine whereas DDoS attacks originate from multiple attacking machines, often routed through other compromised machines

18
Q

What is Elevation of Privilege(s)?

A

An attack where a limited user account is transformed into an account with greater access privileges. Might be accomplished through theft or exploitation of credentials of a higher level account. Also achieved through exploiting vulnerabilities in a system such as privilege file access and scheduled jobs.

It is often required when attempting to set up persistent access to target systems and when looking to exfiltrate data

19
Q

Once STRIDE has been used to understand threats, what is the next step in the process?

A

Controls to prevent compromise

Monitoring to detect compromise

20
Q

Attackers can vary in which ways?

A
Motive
Technical efficiency
Financial backing
Organisation size
Available time/resources

Often have a favourite or preferred attack vector

21
Q

What is an APT

A

APT - Advanced Persistent Threat

Specific attackers which are organised, directed, well financed, patient, focus on remaining undetected

Can carry out long term attacks, waiting for outside influences or correct conditions for success (STUXNET)