CH1 Flashcards
Any potential danger to an asset
Threat
If a vulnerability exist but has not yet been exploited the threat is considered what?
Latent
If someone is actively launching an attack against your system and successfully accesses something or compromises your security against an asset the threat is what?
Realized
The entity that takes advantage of a vulnerability
malicious actor
The path used by a malicious actor to perform an attack
threat agent or threat vector
A weakness in the system design, implementation, software, or code, or the lack of a mechanism.
Vulnerability
5 places vulnerabilities can be found
Applications, Operating Systems, Hardware, Misconfiguration, Shrinkwrap software
The identifier used by vendors, security researchers, and vulnerability coordination centers to disclose vulnerabilities to the public
CVE (Common Vulnerability Exposures)
A piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system.
Exploit
The probability or likelihood of the occurrence or realization of a threat.
risk
Any item of economic value owned by an individual or corporation.
asset
The amount of risk left after safeguards and controls have een put in place to protect the asset
residual risk
List 5 types of threat actors
Script kiddies, organized crime groups, state sponsors and governemnts, hacktivists, terrorist groups.
People who use existing scripts or tools to hack into computers and networks. They lack expertise to write their own scripts
Script kiddies
Group whose main purpose is to steal information, scam people, and make money
Organized crime group
These agents are interested in stealing data, including intellectual property and research-and-development data from major manufacturers, government agencies, and defense contractors.
State sponsors and governments
People who carry out cybersecurity attacks aimed at promoting a social or political cause
Hacktivist
These groups are motivated by political or religious beliefs
Terrorist Groups
These individuals perform ethical hacking to help secure companies and organizations.
White hat hacker
These individuals perform illegal activities, such as organized crime.
Black hat hacker
These individuals usually follow the law but sometimes venture over to the darker side of black hat hacking.
Gray hat hacker
The knowledge about an existing or emerging threat to assets, including networks and systems.
Threat intelligence
What 5 items make up threat intelligence
context, mechanisms, indicators of compromise, implications, and actionable advise
Typically require a host program or file to infect, requiring some human interaction.
Viruses
Can travel from system to system without human interfaction
Worm
Closely related to virus’s and worms, similar to Trojan because users don’t know it’s installed, steals information from the user and eats up bandwidth. Can also redirect web traffic and flood you with popups.
Spyware
What are the primary types of malware attack mechanisms
Master boot record infection, BIOS infection, File infection, Macro infection, Cluster, Multipartite
List 5 basic components of a virus
Search routine, infection routine, payload, antidetection routine, trigger routine.
Programs that pretend to do one thing but, when loaded, actually perform another, more malicious act.
Trojan
An attack in which an attacker leaves a USB thumb drive in the desk drawer of a victim.
Poison apple attack
What is the number one means of malware propogation?
Email attachments
A program used to combine two or more executables into a single packaged program.
Wrappers