CEH Flashcards
What is IT Risk?
Threat x Vuln x Impact = Risk, Threat x Vuln x Asset = Risk, is the probability that something negative might happen.
What are the five phases of hacking?
Reconnaissance which is the collecting information and learning about our target, examples are job posting survey, passive recon, and do some DNS queries. The scanning phases are the active part of the recon, check for open ports, vulnerability scan, and check service versions. Next phase is gaining access for example RCE attacks, password and injection attacks, session hijacking, etc. Next phase is maintaining access and live into the system, command and control systems. The last phase is to cover your tracks which is try not to be identified, check for log files,
What are the types of IoC?
Atomic, compute, and behavioral types.
What are some categories of IoC?
Behavioral, Email, Network, and Host bases.
What is a DMZ and what it is used for?
A Demilitarized Zone is basically an area in your network that is facing outside from your internal network. The idea is to add a layer of security between your critical systems and servers that are more probable of being targeted, for example, a web server.
What are some attack classifications?
Passive and active, close-in, insiders, and distributed attacks.
What are the phases of Cyber Kill Chain?
Reconnaissance, weaponization, delivery, exploitation, installation, command and control (c2), and access control.
Information warfare types…
It uses information and communication technology to gain a competitive advantage over your adversary. C2 or C&C, intelligence-based (knowledge is power), electronic-based (signal jamming), psychological, hacker, economic, cyber-warfare.
What is Confidentiality
Is the effort of an organization to make sure data is kept private or secret. Breaches of confidentiality can be accidental or intentional/unintentional, however, to mitigate breaches, we can use access controls and encryption.
What is integrity?
Is the effort to make sure the data has not been tampered with by making sure it is reliable, authentic and accurate. To promote integrity we can use hashing and digital signature.
What is availability
Is the effort to make sure the data that needs to be consumed by authorized personnel, is accessible. We need to set some protections to prevent denial of services attacks, and natural disasters by promoting disaster recovery plans, backups, redundant systems, and other security controls.
What is authenticity
Is the quality, in terms of the data, of being legitimate or real.
What is non-repudiation?
Is the assurance provided by the system to make sure the sender and receiver of data, cannot later deny having processed the data. We can use digital signatures to make sure the sender of an email, for example, cannot deny sending the email afterwards.
What are the attacker’s motivation into hacking?
Curiosity, hackivism, revenge, bragging rights, cyber crime, terrorism, disruption of business, religious, and political.
Explain the tactics, techniques, and procedures.
tactics are guiding principles, techniques is how you do it, procedures is more granularity from a higher level to a lower level. A tactic is the overall goal of the objective at hand. The techniques are the list of attacks that are going to be used to complete the tactics or the objectives. The procedure are the tools and programs used to proceed with the techniques.