Chapter 2 Flashcards
Threat Actor
An entity that is the cause of an event that has impacted the safety of another entity. Also called a malicious actor.
Avalanche Effect
In a hashing algorithm if one bit is changed then the entire hash is completely different
Advanced Persistent Threat (APT)
Highly sophisticated threat actors that can make constant attacks and have access to massive resources.
Unskilled attackers
A threat actor that runs premade scripts without any knowledge of what is haappening under the hood. “Script kiddies”
Hacktivist
A hacker with a purpose that is motivated by philosophy, revenge, disruption etc. Can be very sophisticated and motivated but often has access to limited funding.
Insider Threat
Someone from inside the organization who can use organization resources against itself for revenge, financial gain etc. Has knowledge of where to aattack and security vulnerabilities.
Organized Crime
Usually motivated by money, almost always an external entity. Very sophisticated. Lots of capital.
Shadow IT
Members of the organization that use workarounds to avoid the security put in place by the IT department. They often set up their own networks to get around limitations like change control and other security practices. Can be a huge risk.
Threat Vector
The method an attacker uses to gain access to the system. Also called “attack vector”
Phishing
Enticing someone to click on a link that can trick you into exposing sensitive data or installing malware. Social engineering intended to trick the recipient into thinking it is a legittimate communication or service.
Scalable Vector Graphic (SVG)
A image file format that can contain embedded code. Can be used to perform HTML injections or deliver javascript attack code.
File Based Vectors
More than just executables, malicous code can hide in many places such as: Adobe PDFs or microsoft office macros
Removable device vectors
USBs can be used to get around a firewall. These can be used to infect air gapped systems.
Air gapped Network
A network with no direct connection to the internet or other networks
802.1x
An authentication protocol that prevents the access of data or network resources until proper credentials are provided.
Supply Chain Vector
Tampering with the underlying infrastructure of manufacturing process to add vulnerabilities.
Managed Service Providers (MSP)
Monitors systems and informs you if things need to be changed. If an attacker can infiltrate an MSP they will have access to many organizations systems.
Typosquatting
URLs that are similar to the legitimate site but have slight changes.
Pretexting
Using sotries and lies to manipulate you into believing their story. Attacker is a character in the story they create.
Smishing
SMS phishing
Impersonation
The attacker pretending to be someone they arent. Could introduce themselves as someone higher in rank.
Identity Fraud
The attacker uses your information to impersonate you, giving them access to your resources and privileges.
Watering hole Attack
Infecting a 3rd party site that employees of the target organization frequent and use it and use it to gain access. Infect all users and then pursue their target.
Defense in Depth
Layering defense measures that can catch threats that others may have missed
Buffer Overflow
Writing more than is expected into a particular area of memory, causing other memory to be overwritten. Developers need to perform bounds checking to prevent this. Difficult exploit, and it needs to be repeatable to be useful.
Race Condition
When two events happen at nearly the same time within an application. This can be a big issue if it is not planned for.
Time of Check to Time of Use (TOCTOU)
Applications may perform a check for a condition before performing an action. Sometimes something may happen between that check and action which can have negative consequences.
Malicious Updates
Attackers perform a supply chain attack to add malicous code to official updates.
Operating System
The foundational computing platform of a device. Is often tens of millions of lines of code, so there is a large surface area for attack.
Patch Tuesday
Every second tuesday of the month there is a new windows update
Code Injection
Adding your own code into an applications input areas. Enabled because of bad programming.
Structured Query Language (SQL)
The most common relational database language
SQL Injection
Adding your own requests to the input of an existing application. Applications should not allow users to make their own specific requests.
Cross Site Scripting (XSS)
A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.
Persistent XSS Attack
Attacker posts a message to a social network that incudes the malicious code. Everyone who clicks the page gets the payload. Could add code that forces the viewers to post the message to their own page.
Hardware Vulnerabilities
Devices that are connected to a network are potential security risks.
IOT
Internet of things
Firmware
The operating system of a hardware device. We may not have direct access to this software. Sometimes we have no idea what this operating system even is. Venders are the only ones who can fix this, and many dont care about security vulnerabilities.
End of Life Notice (EOL)
A notice that a manufacturer is no longer selling the product. Many times the product will stop recieving updates and patches.
End of Service Life (EOSL)
Manufacturer is no longer selling or providing support for the product. May still ahve a premium cost service option. EOSL is a significant concern as security patches are an important part of normal operation.
Legacy Platforms
Older devices that may be running end of life software. The security risks and maintainance costs must be compared to the returns. May require additional security protections like additional firewall rules. Add additional IPS signatures for older operating systems.Vi
Virtual Machine (VM)
an isolated computing environment created by abstracting resources from a physical machine.
VM Escape
Breaking out of the VM and interacting with the host operating system or hardware.
Hypervisor
Manages the relationship between the physical and virtual resources of a virtual machine and it’s host.
Common Vulnerability Scoring System (CVSS)
A way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity
Directory Traversal
Allowing people to manually move around the structure of a webserver into different folders or subdirectories.
Remote Code Execution (RCE)
The ability for attackers to run code on a machine without direct physical access.
Out of Bounds Write
Write to unauthorized memory areas resulting in data corruption, crashing, or code execution.