Chapter 1 Flashcards

1
Q

What is a threat environment?

A

A threat environment consists of all the attacks and attackers that a company faces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three goals of security?

A

It’s the CIA triad:
Confidentiality - No one else can read your information, either while it’s on a computer, or while it’s traveling across a network. Encryption is an example of this.
Integrity - The attacker cannot change or destroy information, or at the worst, the owner can detect the change or destruction.
Availability - Those that are authorized to use the information are not prevent from doing so. This might include failsafe servers and things like that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a compromise?

A

A compromise (also known as an incident or a breach), is basically a successful attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are countermeasures? What types of countermeasures are there?

A

A countermeasure is a tool that is used to thwart attacks. There are three main kinds of countermeasures: Preventative, detective, and corrective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a preventative countermeasure?

A

A preventative countermeasure is there to prevent a certain attack from working (like a firewall).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a detective countermeasure?

A

A detective countermeasure detects (duh) that something is wrong. An anti-virus program is this, as well as a corrective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a corrective countermeasure?

A

A corrective countermeasure is a countermeasure that is deployed in order to actually correct a specific attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are employees and ex-employees the most dangerous threats?

A

Employees and ex-employees are dangerous because they often have knowledge of internal systems, have permissions to access systems, often know how to avoid detection, and they’re generally trusted.
Who watches the watchmen, eh?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What sort of things can employees do?

A

Sabotage - Destruction of hardware, software, or data, or worse, planting of a time bomb or logic bomb on a computer.
Hacking - Accessing things that they don’t have authorization to.
Financial Theft - Theft of assets or money, or the big one, Intellectual Property.
Extortion - Threatening to release information in order to manipulate someone.
Sexual or Racial Harassment of Other Employees - Displaying pornographic material, often via email.
Internet Abuse - Pornography, piracy, excessive personal use.
Carelessness - Loss of computers or media devices that contain sensitive information due to neglect or carelessness.
Contract Workers -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hacking?

A

Hacking is defined as intentionally accessing a computer resource without authorization, or going beyond authorization. Authorization is the key here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is separation of duties?

A

Separation of duties is the principle in which you only give each employee permissions necessary to complete their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware?

A

Malware (evil software) is a generic name for… well, “evil software”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of malware?

A

Viruses - Programs that attach themselves to legitimate programs. When those programs are executed, it causes the “virus” to spread to other executables. Primarily, they’re spread by e-mail.
Worms - Programs that do not attach themselves to other programs. They can spread via “direct-propagation”, allowing them to jump between computers without human intervention on the receiving computer, provided it has a targeted vulnerability. They can spread fast.
Blended Threats - Malware that propagates in multiple ways. Think a blend between virus and worm.
Nonmobile malware - Malware that must be placed on the user’s computer through deception of the user.
Trojan Horse - Remote Access Trojan, allows for remote control of the victim’s PC. It masquerade as a good program, until the victim runs it, at which point the payload is delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a payload?

A

Payload is the term for the piece of code in malware that does the actual damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spyware?

A

Spyware is a form of Trojan that gathers information about you and sends it back to someone. It’s subtle. Some only send rather benign information, others do things like logging keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a rootkit?

A

A rootkit takes control of the super user account, and uses this authority to hide the malware in a far more effective way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is mobile code?

A

Mobile code is code embedded in a webpage that is executed automatically (Javascript, Active-X, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is social engineering?

A

Social engineering is an attempt to trick a user in order to do something that would normally go against security policies. Spam, phishing, hoaxes, that sort of thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who are traditional hackers?

A

Traditional hackers are people who are motivated to bypass security to get a thrill, validation, or a sense of power. Mostly motivated by reputation among their peers, but their crimes are petty at most. Not really relevant any longer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are Reconnaissance probes?

A

Reconnaissance probes are the first step of a hack, scanning IP addresses and ports, looking for open ports and services are running. These packets, should they be received, will generate a response, signalling an opening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an exploit?

A

An exploit is the attack method used to break into a computer.

22
Q

What is IP address spoofing?

A

IP address spoofing is a method of hiding your identity; the catch is that you do not receive packets back.

23
Q

Chain of Attack Computers? What’s that?

A

A chain of attack computers is when an attacker sends his probes through layers of remote computers.

24
Q

What is piggybacking?

A

Piggybacking is a form of social engineering whereupon someone “holds the door” into a secured area for someone who has no authorization to be there.

25
Q

What is shoulder surfing?

A

Shoulder surfing is the simple act of watching someone type their password over their shoulder, or otherwise hidden.

26
Q

What is a Denial-of-Service attack?

A

A Denial-of-Service attack is when a server or network is made unavailable to legitimate users by sending a flood of attack messages to the victim. An alternate method is the Distributed DoS attack, where the victim is flooded by bots. The packets sent don’t even have to be malicious; there just have to be a lot of them.

27
Q

What is a bot?

A

A bot is a machine that has been compromised by an attacker, allowing the attacker to remotely control the machine and direct it to send attack packets, spam, etc.

28
Q

What is click fraud?

A

Click fraud is when a company pays for ads, and then uses a bot to click that ad to generate revenue.

29
Q

What is SCADA?

A

Systems Control and Data Acquisition - Things like the infrastructure of an area; water treatment plants, power plants, that sort of thing. These are targets of cyberwar and cyberterror.

30
Q

What are the four reasons that employees are especially dangerous?

A
  1. They usually have extensive knowledge of the system.
  2. They often have access to sensitive parts of systems.
  3. They know how to avoid detection.
  4. They are trusted by their employer.
31
Q

What type of employee is the most dangerous?

A

IT employees are the most dangerous, due to their extraordinary knowledge and access.

32
Q

Define sabotage.

A

Sabotage is the destruction of hardware, software, or data.

33
Q

What is intellectual property?

A

Intellectual property is information that is owned by the company and protected by law.

34
Q

What are the two things employees primarily like to steal?

A

Employees primarily like to steal finances, and intellectual property.

35
Q

What’s the difference between intellectual property and trade secrets?

A

Intellectual property is owned by the company and are protected by law. Trade secrets are not protected by law.

36
Q

What is extortion?

A

Extortion occurs when the perpetrator attempts to control the victim by threatening to take actions that would harm the victim.

37
Q

Who, besides employees, constitute potential “internal” threats.

A

Contract workers are an internal threat, and are not full employees of the company.

38
Q

What is a RAT?

A

A RAT, or Remote Access Trojan, is a Trojan that gives the attacker remote control of the computer.

39
Q

What are some ways non-mobile malware can infect a computer?

A

Non-mobile malware can infect a computer by:
Being placed there by a hacker.
Being deposited as “payload” by a virus or worm.
Enticing the user to download it.
Being executed as mobile code within a website.

40
Q

What’s the difference between a virus and a worm?

A

A virus infects files and executables and relies on the user for propagation. A worm is a stand-alone program, and does not require the user to propagate, and can do things on its own.

41
Q

How do worms spread?

A

Worms spread by looking for specific weaknesses in connected systems and exploiting them.

42
Q

What are downloaders?

A

Downloaders are a form of Trojan horse that are generally small programs, and hard to detect, which then download much larger Trojans.

43
Q

Why can cookies be dangerous?

A

Cookies are dangerous because cookies can, at times, keep private information such as passwords. Sometimes, when they keep too much personal information, they become spyware.

44
Q

What’s the difference between a Trojan horse and a rootkit?

A

A Trojan horse replaces a legitimate program. A rootkit takes over the root account of a Unix computer and uses the admin privileges to hide itself.

45
Q

What is a Trojan horse?

A

A Trojan horse is a program that deletes a legitimate existing system program, and takes its place.

46
Q

What’s the difference between phishing and spear phishing?

A

Phishing normally targets wide swaths of people. Spear phishing is targeted at one or a few individuals, for a specific purpose.

47
Q

What’s the difference between IP address scanning and port scanning?

A

IP address uses an ICMP echo on all IP addresses within a range, and listens for echoes back. Port scanning uses the “live” addresses from an IP address scan and sends scanning probes to request connections on specific ports, to determine what is running.

48
Q

What does “owning” a computer mean?

A

Owning a computer means that the attacker is able to do whatever he or she wishes.

49
Q

When can an attacker not use IP address spoofing?

A

An attacker cannot use IP address spoofing for reconnaissance probes, as their replies would be lost, and that’s the whole point of the thing.

50
Q

What is pretexting?

A

Pretexting occurs when an attacker calls and claims to be a specific customer, hoping to get information that is private to that customer.

51
Q

Define fraud.

A

Fraud occurs when the attacker deceives the victim into doing something that goes against the victim’s financial self-interest.