CH1 Flashcards

1
Q

Any potential danger to an asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a vulnerability exist but has not yet been exploited the threat is considered what?

A

Latent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If someone is actively launching an attack against your system and successfully accesses something or compromises your security against an asset the threat is what?

A

Realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The entity that takes advantage of a vulnerability

A

malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The path used by a malicious actor to perform an attack

A

threat agent or threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A weakness in the system design, implementation, software, or code, or the lack of a mechanism.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 places vulnerabilities can be found

A

Applications, Operating Systems, Hardware, Misconfiguration, Shrinkwrap software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The identifier used by vendors, security researchers, and vulnerability coordination centers to disclose vulnerabilities to the public

A

CVE (Common Vulnerability Exposures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The probability or likelihood of the occurrence or realization of a threat.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any item of economic value owned by an individual or corporation.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The amount of risk left after safeguards and controls have een put in place to protect the asset

A

residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List 5 types of threat actors

A

Script kiddies, organized crime groups, state sponsors and governemnts, hacktivists, terrorist groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

People who use existing scripts or tools to hack into computers and networks. They lack expertise to write their own scripts

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Group whose main purpose is to steal information, scam people, and make money

A

Organized crime group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These agents are interested in stealing data, including intellectual property and research-and-development data from major manufacturers, government agencies, and defense contractors.

A

State sponsors and governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

People who carry out cybersecurity attacks aimed at promoting a social or political cause

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These groups are motivated by political or religious beliefs

A

Terrorist Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These individuals perform ethical hacking to help secure companies and organizations.

A

White hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These individuals perform illegal activities, such as organized crime.

A

Black hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

These individuals usually follow the law but sometimes venture over to the darker side of black hat hacking.

A

Gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The knowledge about an existing or emerging threat to assets, including networks and systems.

A

Threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What 5 items make up threat intelligence

A

context, mechanisms, indicators of compromise, implications, and actionable advise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Typically require a host program or file to infect, requiring some human interaction.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Can travel from system to system without human interfaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Closely related to virus’s and worms, similar to Trojan because users don’t know it’s installed, steals information from the user and eats up bandwidth. Can also redirect web traffic and flood you with popups.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the primary types of malware attack mechanisms

A

Master boot record infection, BIOS infection, File infection, Macro infection, Cluster, Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

List 5 basic components of a virus

A

Search routine, infection routine, payload, antidetection routine, trigger routine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Programs that pretend to do one thing but, when loaded, actually perform another, more malicious act.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An attack in which an attacker leaves a USB thumb drive in the desk drawer of a victim.

A

Poison apple attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the number one means of malware propogation?

A

Email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A program used to combine two or more executables into a single packaged program.

A

Wrappers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Similar to WinZip, Rar, Tar… these programs compress files to prevent anyone from viewing the malware’s code until it is placed in memory

A

Packers

34
Q

Encrypt or obscure the code. Some obscure the contents of the Trojan by applying an encryption algorithm.

A

Crypters

35
Q

Popular method used by criminals, hacktivist, and nation-state attackers to make money. Encrypts specific files in the victims system until a ransom is paid to the attacker.

A

Ransomware

36
Q

A way of moving information through a communication channel or protocol in a manner in which it was not intended to be used.

A

Covert channel

37
Q

Software or hardware devices used to record everything a person types.

A

Keyloggers

38
Q

A standalone environment that allows you to safely view or execute the program while keeping it contained.

A

Sandbox (Cisco ThreatGrid)

39
Q

List 3 types of injection-based vulnerabilities

A

SQL injection, HTML injection, Command injection

40
Q

This type of vulnerability can allow an attacker to view, insert, delete, or modify records in a database. The attacker inserts, or injects, partial or complete SQL queries via the web application.

A

SQL Injection

41
Q

What are the 3 categories of SQL injection attacks

A

in-band, out-of-band, blind

42
Q

SQL injection attack where attacker obtains data by using the same channel that is used to inject the SQL code (data is dumped directly in a web application or web page).

A

In-band SQL injection

43
Q

SQL injection attack where the attacker retrieves data using a different channel (an email, text, or instant message).

A

Out-of-band SQL injection

44
Q

SQL injection attack where the attacker does not make the application display or transfer any data; rather, the attacker is able to reconstruct the information by sending specific statements and discerning the behavior of the application and database.

A

Blind (or inferential) SQL injection

45
Q

Vulnerability that occurs when an unauthorized user is able to control an input point and able to inject arbitrary HTML code into a web application.

A

HTML Injection

46
Q

Attack in which an attacker tries to execute commands that he or she is not supposed to be able to execute on a system via a vulnerable application.

A

Command injection

47
Q

Credential brute forcing, session hijacking, redirecting, exploiting default credentials, exploiting weak credentials, exploiting Kerberos vulnerabilities are all examples of what type of vulnerability.

A

Authentication-based vulnerabilities.

48
Q

In this type of attack, an attacker attempts to log into an application or system by trying different usernames and passwords.

A

Credential brute force and password cracking

49
Q

Brute force attack in which the attacker actively tries to log in to the application by using many different combinations of credentials

A

Online brute force

50
Q

Brute force attack in which the attacker can gain access to encrypted data or hashed passwords.

A

Offline brute-force

51
Q

Some of the most common web applications vulnerabilities seen today where attackers use obfuscation techniques by encoding tags or malicious portions of the script using Unicode so that the link or HTML content is disguised to the end user browsing the site.

A

Cross-site Scripting (XSS)

52
Q

What are the 3 major categories of XSS

A

Reflected XSS, Stored (persistent) XSS, DOM-based XSS

53
Q

Type of XSS attack in which malicious code or scripts are injected by a vulnerable web application using any method that yields a response as part of a valid HTTP request. Example - user persuaded to follow a malicious link to a vulnerable server that injects the malicious code back to the user’s browser.

A

Reflected XSS

54
Q

Type of XSS attack in which the malicious code or script is permanently stored on a vulnerable or malicious server, using a database. These are typically carried out on blog sites, web forums, and other permanent storage methods.

A

Stored (persistent) XSS

55
Q

Type of XSS attack in which the attacker sends a malicious URL to the victim, and after the victim clicks the link, it may load a malicious website or a site that has a vulnerable DOM router handler. After the site is rendered by the browser, the payload executes the attack in the user’s context on that site.

A

DOM (Document Object Model) XSS

56
Q

Type of attack in which unauthorized commands are transmitted from a user who is trusted by the application. AKA (on-click attacks or session-riding).

A

Cross-site request forgery (CSRF or XSRF)

57
Q

Occurs when a system or application attempts to perform two or more operations at the same time however, due to the nature of such a system or application, the operations must be done in the proper sequence in order to be done correctly. These are also referred to as TOCTOU attacks). Example - policy push to IPS device rebuilds ACL’s - attacker has a small window to bypass the ACL’s.

A

Race conditions

58
Q

A non-profit charitable organization that leads several industry-wide initiatives to promote the security of applications and software. They list the top 10 most common vulnerabilities against applications at their website.

A

OWASP Top 10

59
Q

The requirement that private or confidential information not be disclosed to unauthorized individuals

A

Confidentiality

60
Q

The ability to make sure that a system and its data has not been altered or compromised.

A

Integrity

61
Q

A requirement that information and programs are changed only in a specified and authorized manner

A

Data Integrity

62
Q

A requirement that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A

System Integrity

63
Q

Systems, applications, and data must be available to authorized users when needed and requested. This concept is referred to as….

A

Availability

64
Q

What are the 3 types of DDoS attacks

A

Direct DDoS, Reflected DDoS, Amplification DDoS

65
Q

Occurs when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.

A

Direct DDoS

66
Q

Occur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim.

A

Reflected DDoS

67
Q

A form of reflected DDoS attack in which the response traffic (sent by the unwitting participant) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).

A

Amplification DDoS

68
Q

According to NIST, what are the advantages of cloud computing

A

Distributed storage, scalability, resource pooling, access from any location, measured service, automated management.

69
Q

According to NIST, what are the essential characteristics of cloud computing

A

On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured service

70
Q

Cloud deployment model that is open for public use

A

Public Cloud

71
Q

Cloud deployment model that is used just by the client organization on-prem or at a dedicated area in a cloud provider

A

Private Cloud

72
Q

Cloud deployment model that is composed of two or more clouds (including on-prem)

A

Hybrid Cloud

73
Q

Cloud deployment model that is shared between several organizations

A

Community Cloud

74
Q

Accorindg to NIST, Cloud computing can be broken into the following 3 basic models

A

IaaS, PaaS, SaaS

75
Q

Cloud solution where you are renting infrastructure. You purchase virtual power to execute your software as needed.

A

IaaS

76
Q

Cloud solution providing everything except applications.

A

PaaS

77
Q

Cloud solution designed to provide a complete packaged solution. The software is rented out to the user. Usually provided through some type of front end or web portal.

A

SaaS

78
Q

Includes any computing devices (mechanical and digital machines) that can transfer data over a network without requiring human-to-human or human-to-computer interaction - for example, sensors, home appliances, connected security cameras, wearables, and numerous other devices.

A

IoT (Internet of Things)

79
Q

A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices

A

Cybersecurity incident

80
Q

Any observable occurrence in a system or network. Include users connecting to a file share, server receiving a request for a web page, user sending email etc.

A

Event