Cell division Flashcards

1
Q

Current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally misused the access to negatively affect the CIA of the organization’s data or information systems.

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 insider threat methods

A

Steal sensitive data via storage devices
Open backdoors
Logic bombs
Attack internal resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insider threat detection and prevention techniques

A
Data/File encryption
DLP
Data access monitoring
Data redaction
Data access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discretional access control

A

Only users specified by the owner may have some combination of read, write, and execute rights to file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory access control

A

Access control policy decisions are made by a central authority, not by the individual owner of an object, and the owner cannot change access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Direct remote attacks

A

Attack delivered via wifi, ethernet, rf or bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Drive by attack

A

Malware automatically downloads to user’s system after visiting legitimate, but compromised website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacks on south korea

DarkSeoul Gang

A

North Korea state sponsored threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TTPs include weaponized email attachments

Human intelligence usage

A

Russian state sponsored threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Russian attributed malware

A
Zeus
Gozi
SpyEye
SpyZeus
Ligats Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vietnamese govt suspected

Poses threat to companies doing business, manufacturing or preparing to invest in the country

A

APT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APTs associated with China

A

30, 18, 17, 12, 3, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APTs associated with Russia

A

29, 28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attributes of an APT

Loads malicious software directly into a computer’s memory in a way that bypasses HD
Uses blackcoffee malware as part of the first stage of its attacks

A

APT 17 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attributes of an APT -

Major data breach at community health systems
Exploited “Heartbleed” bug in VPN server within CHS network
Gh0st remote access trojan (RAT)

A

APT 18 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attributes of an APT -

Components designed to infect removable drives in order to cross air-gapped networks and steal data
Steal sensitive political, economic and military info about region for gov espionage

Associated malware:
Backspace
Neteagle
Shipshape
Spaceship
Flashfood
A

APT 30 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attributes of an APT -

Only compromised servers for C2 communication

Associated malware:
Hammertoss
Uploader
tDiscover

A

APT 29 - Russia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Associated malware - Chopstick, Sourface
Targets former Soviet state and NATO
Gain insider info related to govts, militaries and security organizations

A

APT 28 - Russia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Maintain surveillance on media outlets that could impact reputation of Chinese leaders
Targets: Western journalists, US military contractors, Taiwanese and Japanese govts, Japanese tech companies
Associated malware- Riptide, hightide, threebyte and waterspout
Most clandestine, discriminating, skilled Chinese group
Adapts tools/techniques based on news reports about itself

A

APT 12 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Associated malware - Leouncia

Tends to focus on sat telecoms and tech companies based primarily in SE Asia

A

APT 5 - Undisclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Main actor behind a major attack campaign: Op Clandestine Fox
Associated malware: Shotput, cookiecutter, and Plugx/sogu

A

APT 3 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Systematically stole hundreds of TB of data from at least 141 organizations spanning 20 major industries
Specifically targets industries that China identifies as strategic in its 5 year plan
Associated malware:
Backdoor.(random names)
Steals broad categories of intellectual property

A

APT 1 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Agents that make use of cyberspace resources for intel collection

A

Cyberspace espionage agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1 of the critical infrastructure protocols in internet traffic flow

Can be manipulated to route traffic from 1 country to another

A

Border gateway protocol threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Exploits affect info and communication technology devices, which are manufactured, assembled, and distributed from a multitude of individual component and through numerous distributors
Operations affect hardware, software, and firmware components

A

Supply chain threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

High performing computing (Russia has 6 HPC systems capable of trillion computations per second)
Quantum computing: Are aggressively pursuing implementations for secure quantum communication protocols

A

Advanced computing technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Generated bi-weekly by the 624th Ops Center
Designed to keep AF members up to date on current threats
Strengthens SA of threats that could affect AF personnel/systems

A

Cyber threat bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Annual report which uses insights, statistics, and case studies to show how tools and tactics of APT actors evolved since 2014

A

Mandiant’s annual cyber threat report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users
(Annual threat report, monthly threat report, white papers)

A

Symantec security response publications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Report that resulted in analytic efforts between DHS and FBI
USG confirmed 2 RIS actors (APT 29 and APT 28) participated in intrusion against US political party
Referred to GRIZZLY STEPPE

A

JAR-16-20296A

Joint Analysis Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Adversaries transition through 5 phases starting with 0 - 4

A

Administer - Intent and resource development

Prepare - Recon and staging

Engage - Delivery and Exploitation

Propagate - Internal recon, lateral movement, and network persistence

Effect - Exfil and attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Phase 0

A

Administer

resource development and tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Phase 1

A

Prepare

recon and staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Phase 2

A

Engage

delivery and Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Phase 3

A

Propagate

internal recon, lateral movement, and network persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Phase 4

A

Effect

exfil and attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

3 primary missions in DCO

A

Defend networks, systems and information

Prepare to defend the US and its interests against cyberattacks of significant consequence

Provide integrated cyber capabilities to support military operations and contingency plans

38
Q

Encryption programs use ___ to encrypt and decrypt data

A

algorithms

39
Q

Types of symmetric algorithms

A

Stream ciphers (RC4)

Block ciphers (3DES & AES)

40
Q

Mathematical function that converts a numerical input value into another compressed numerical value

A

Hashing

41
Q

4 goals of cryptography

A

Privacy - What is private remains private

Authenticity - Proof that msg is from person we believe it to be from

Integrity - Info should remain unaltered at the point it was produced

Non-repudiation - Sender of data is provided w/ proof of delivery and recipient is assured of the sender’s identity

42
Q

Enclave protection mechanisms:

INFOCON 5

A

Routine network ops (DoDIN Ops)

Higher INFOCON less severe

43
Q

INFOCON 1

A

Highest readiness condition

Significant impact to end-users for short periods

44
Q

Mission Assurance Category MAC I

A

Most stringent protection measures

Requires high integrity and high availability

45
Q

Mission Assurance Category MAC III

A

Requires best practice protective measures

Info systems handle info necessary for day-to-day business

46
Q

Provide non-product specific requirements to mitigate sources of security vulnerabilities consistently and commonly encountered across IT systems and applications

Not be confused w/ STIGs

A

DISA Security Requirement Guides

SRGs

47
Q

Minimum requirements, standards, controls and options for securing the enclave as a whole

A

DISA Security Technical Implementation Guide (STIGs)

48
Q

Required by all enclaves connecting to the DISN

Initiated in parallel with request fulfillment process for new/additional connections

A

Assessment and authorization (A&A) process

49
Q

Seeks to provide a more threat-focused, mission based assessment

Analyze 3 levels of effort to review operational risk (mission, threat, and vulnerabilities)

A

Command cyber operational readiness inspections

(CCORIs) for short

50
Q

If directed by ____ or ____, US military may conduct cyber ops to counter imminent/on-going attack against US homeland or US interests

A

POTUS or SecDef

51
Q

2 encryption classes??

A

Asymmetric

Symmetric

52
Q

Firewall can have 2 rules: define default deny

A

Deny by default/deny all

Assumes most traffic is potentially malicious, unwanted, or unauthorized

53
Q

Firewall can have 2 rules: define default allow

A

Allow by default or allow all

Assumes most traffic is benign

54
Q

When writing firewall rules, what is the order the syntax goes in?

A
base protocol
source address
source port
destination address
destination port
action
55
Q

NIDS function in 3 modes

A

Signature detection

Anomaly detection

hybrid

56
Q

Cyber incident handling process

A

Detection of events

Preliminary analysis and ID

Preliminary response action

Incident analysis

Response and recover

Post-incident analysis

57
Q

Incident category

CAT 0

A

Training and exercises

58
Q

Incident category

CAT 1

A

Root level intrusion (incident)

59
Q

Incident category

CAT 2

A

user level intrusion (incident)

60
Q

Incident category

CAT 3

A

Unsuccessful activity attempt (event)

61
Q

Incident category

CAT 4

A

Denial of service (incident)

62
Q

Incident category

CAT 5

A

Non-compliance activity (event)

63
Q

Incident category

CAT 6

A

Reconnaissance (event)

64
Q

Incident category

CAT 7

A

Malicious logic (incident)

65
Q

Incident category

CAT 8

A

Investigating (event)

66
Q

Incident category

CAT 9

A

Explained anomaly (event)

67
Q

The discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless comms, and storage devices in a way that is admissible as evidence in a court of law

A

Digital forensics

68
Q

4 phases of forensics process

A

Collection

Examination

Analysis

Reporting

69
Q

Document that serves as starting point for developing a forensic capability

A

NIST 800-86

70
Q

Any data stored in IS memory (system registers, cache, RAM) that will be lost when the IS loses power or is shut down

A

Volatile data

Open connections, ports and sockets, routing info, network interface status, ARP cache

71
Q

Data in the IS’s HD and removable storage media that will not be changed when the machine is powered off

A

Non-volatile data

72
Q

Windows based forensic tools

A
EnCase
Forensic Toolkit (FTK)
73
Q

Unix based forensic tools

A

The Sleuth Kit (TSK), SMART

74
Q

Malware analysis 3 types of analysis

A

Surface Analysis

run-time

static

75
Q

Goal of this process is to deliver fielded capability within 180 days of validated request
Identify service specific needs during current conflict or crisis that if not satisfied in an expedited manner, will result in unacceptable loss of life or critical mission failure

A

UON Urgent Operational Need

76
Q

Urgent need identified by a warfighting commander that requires synchronization across multiple Service/agency providers to ensure complete and timely combat capability is provided to the Joint warfighter

A

JUON Joint urgent operational need

77
Q

3 types of Test & evaluation

A

Developmental testing

Operational testing

Cyber test

78
Q

Lowest level in the software chain

Language of reversing

A

Assembly language

79
Q

Take a program’s executable binary as input and generate textual files that contain the assembly language code for part/whole of program

A

Disassembler

80
Q

Allow software developers to observe their program while it’s running

A

Debuggers

81
Q

Program that converts instructions into a machine-code or lower level form so that they can be read and executed by a computer

A

Compiler

82
Q

Tries to reverse compilation process to obtain the original source code file or something similar to it
Takes binary file & attempts to produce readable high-level language code from it

A

Decompiler

83
Q

Byte = __ bits

Word = __ bits

Dword = __ bits

Qword = __ bits

A

8 bits

16 bits = 2 bytes

32 bits = 4 bytes

64 bits = 8 bytes

84
Q

__ means load the value

happens from right to left

A

MOV

faster than Load effective address

85
Q

__ is intended to be used for arithmetic operations or pointers to memory

A

LEA = load effective address

86
Q

Motivated by money and power

Previously lawful citizens with technical skills turn to cybercrime as means to escape poverty

A

Criminal syndicates

87
Q

Means of general protest or to promote an expreseed ideology or a political agenda

The “anonymous” collective

A

Cyber militias / hacktivists

88
Q

Form of specialized black hats

Develop original software for antagonistic or criminal purposes

A

Malware authors

89
Q

Use computer and network technologies to carry out their attacks and cause public fear

Islamic State hacking division

A

cyber terrorists

90
Q

Main motives are to aid or support one’s own nation-state in an ongoing real world conflict or war

A

Patriot hacking

91
Q

Layer 8 issues

Weakest link

A

Ordinary citizen

92
Q

Mission analysis is phased in to the 4 phases

A

Site section

Pre-inspection

Inspection

Post-inspection