Chapter 4 Mod2: Understand Network cyber threats and attacks Flashcards

1
Q

What is the goal of an attack involving spoofing?

A

The goal of a spoofing attack is to gain access to a target system through the use of a falsified identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of logical identification can be targeted in a spoofing attack?

A

Spoofing can be used against IP addresses, MAC addresses, usernames, system names, wireless network SSIDs, email addresses, and many other types of logical identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What characterizes an attack that attempts to misdirect legitimate users to malicious websites?

A

An attack that attempts to misdirect legitimate users to malicious websites through the abuse of URLs or hyperlinks in emails could be considered phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of a denial-of-service (DoS) attack?

A

The primary goal of a denial-of-service (DoS) attack is to prevent legitimate activity on a victimized system by consuming its network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What distinguishes distributed denial-of-service (DDoS) attacks from DoS attacks?

A

Attacks involving numerous unsuspecting secondary victim systems are known as distributed denial-of-service (DDoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two main functions of a computer virus?

A

The two main functions of a computer virus are propagation and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a computer virus spread, and what is required for its propagation?

A

A computer virus is a self-replicating piece of code that spreads without the consent of a user, but frequently with their assistance. The user has to click on a link or open a file for the virus to propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What distinguishes worms from other malicious code objects?

A

Worms pose a significant risk to network security with the same destructive potential as other malicious code objects, but they have an added twist—they propagate themselves without requiring any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a notable characteristic of worms regarding their propagation?

A

Worms propagate themselves without requiring any human intervention, making them distinct from other forms of malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is a Trojan named after the ancient story of the Trojan horse?

A

A Trojan is named after the ancient story of the Trojan horse because it is a software program that appears benevolent but carries a malicious, behind-the-scenes payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide an example of how Trojans are commonly used in cyber attacks.

A

Ransomware often uses a Trojan to infect a target machine. The Trojan then uses encryption technology to encrypt documents, spreadsheets, and other files stored on the system with a key known only to the malware creator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do attackers position themselves in an on-path attack?

A

In an on-path attack, attackers place themselves between two devices, often between a web browser and a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is another term commonly used to refer to on-path attacks?

A

On-path attacks are also known as man-in-the-middle (MITM) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What characterizes a side-channel attack?

A

A side-channel attack is a passive, noninvasive attack aimed at observing the operation of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some methods used in side-channel attacks?

A

Methods in side-channel attacks include power monitoring, timing analysis, and fault analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is an Advanced Persistent Threat (APT) characterized?

A

APT refers to threats that demonstrate an unusually high level of technical and operational sophistication, spanning months or even years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is typically behind APT attacks?

A

APT attacks are often conducted by highly organized groups of attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What characterizes insider threats?

A

Insider threats arise from individuals who are trusted by the organization, and they may include disgruntled employees, employees involved in espionage, or even trusted users who fall victim to scams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Are insider threats always willing participants?

A

No, insider threats are not always willing participants. A trusted user who falls victim to a scam could become an unwilling insider threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How is malware defined?

A

Malware is a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system, or otherwise annoying or disrupting the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How is ransomware defined?

A

Ransomware is malware used for the purpose of facilitating a ransom attack. These attacks often use cryptography to “lock” the files on an affected computer and demand the payment of a ransom fee for the “unlock” code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does Intrusion Detection System (IDS) tools; Identify treats, Prevent treats of both?

A

Identify treats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does Host-based IDS (HIDS) tools; Identify treats, Prevent treats of both?

A

Identify treats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Does Network-based IDS (NIDS) tools; Identify treats, Prevent treats of both?

A

Identify treats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Does SIEM tools; Identify treats, Prevent treats of both?

A

Identify treats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Does Anti-malware / Antivirus tools; Identify treats, Prevent treats of both?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Does Scans; Identify treats, Prevent treats of both?

A

Identify treats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Does Firewall; Identify treats, Prevent treats of both?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Does Intrusion Protection System (IPS-NIPS/HIPS); Identify treats, Prevent treats of both?

A

Both

30
Q

What is an intrusion detection system (IDS)?

A

An IDS is a security mechanism that automates the inspection of logs and real-time system events to detect intrusion attempts and system failures.

31
Q

How does an IDS contribute to a defense-in-depth security plan?

A

An IDS is intended to be part of a defense-in-depth security plan, working with and complementing other security mechanisms like firewalls, although it does not replace them.

32
Q

What types of attacks can IDSs recognize?

A

IDSs can recognize attacks from external connections (e.g., from the internet) and attacks that spread internally (e.g., malicious worms).

33
Q

What is the primary goal of an IDS?

A

The primary goal of an IDS is to provide a means for a timely and accurate response to intrusions by detecting suspicious events and sending alerts or raising alarms.

34
Q

How are IDS types classified, and what are the main categories?

A

IDS types are commonly classified as host-based IDS (HIDS), which monitors a single computer or host, and network-based IDS (NIDS), which monitors a network by observing network traffic patterns.

35
Q

What does HIDS stand for?

A

HIDS stands for Host-based Intrusion Detection System.

36
Q

What does a HIDS monitor?

A

A HIDS monitors activity on a single computer, including process calls and information recorded in system, application, security, and host-based firewall logs.

37
Q

How does a HIDS differ from a NIDS in terms of examining events?

A

A HIDS can often examine events in more detail than a NIDS and can pinpoint specific files compromised in an attack.

38
Q

What specific benefit do HIDSs offer over NIDSs?

A

HIDSs can detect anomalies on the host system that NIDSs cannot detect. For example, they can detect infections where an intruder has infiltrated a system and is controlling it remotely.

39
Q

What is a drawback of HIDSs in terms of management compared to NIDSs?

A

HIDSs are more costly to manage than NIDSs because they require administrative attention on each system, whereas NIDSs usually support centralized administration.

40
Q

What limitation does a HIDS have in terms of detecting network attacks?

A

A HIDS cannot detect network attacks on other systems.

41
Q

What does NIDS stand for?

A

NIDS stands for Network Intrusion Detection System.

42
Q

What does a NIDS monitor and evaluate?

A

A NIDS monitors and evaluates network activity to detect attacks or event anomalies.

43
Q

Can a NIDS monitor the content of encrypted traffic?

A

No, a NIDS cannot monitor the content of encrypted traffic but can monitor other packet details.

44
Q

How does a NIDS monitor a large network?

A

A single NIDS can monitor a large network by using remote sensors to collect data at key network locations that send data to a central management console.

45
Q

What types of network locations can sensors in a NIDS monitor traffic at?

A

Sensors in a NIDS can monitor traffic at routers, firewalls, network switches that support port mirroring, and other types of network taps.

46
Q

Does a NIDS have a significant negative effect on overall network performance?

A

No, a NIDS has very little negative effect on overall network performance.

47
Q

What limitation does a NIDS have regarding the success of an attack?

A

While a NIDS can detect the initiation of an attack or ongoing attacks, it can’t always provide information about the success of an attack or whether specific systems, user accounts, files, or applications were affected.

48
Q

What does SIEM stand for?

A

SIEM stands for Security Information and Event Management.

49
Q

What is the general idea behind a SIEM solution?

A

The general idea of a SIEM solution is to gather log data from various sources across the enterprise to better understand potential security concerns and apportion resources accordingly.

50
Q

How does SIEM contribute to security management?

A

SIEM tools collect information about the IT environment from many disparate sources to examine the overall security of the organization and streamline security efforts.

51
Q

How can SIEM systems be used in conjunction with other components?

A

SIEM systems can be used along with other components (defense-in-depth) as part of an overall information security program.

52
Q

What is the importance of keeping systems and applications up to date?

A

Keeping systems and applications up to date is crucial because vendors regularly release patches to correct bugs and security flaws, reducing the risk of threats.

53
Q

What does patch management ensure?

A

Patch management ensures that systems and applications are kept up to date with relevant patches.

54
Q

How can you reduce the risk of threats related to unnecessary services and protocols?

A

By removing or disabling unneeded services and protocols, the risk of threats can be reduced. Attackers cannot exploit vulnerabilities in services or protocols that are not running.

55
Q

What is the role of intrusion detection and prevention systems in threat prevention?

A

Intrusion detection and prevention systems observe activity, attempt to detect threats, provide alerts, and can often block or stop attacks

56
Q

How can anti-malware software contribute to threat prevention?

A

Anti-malware software serves as a primary countermeasure against various types of malicious code, such as viruses and worms.

57
Q

What is the role of firewalls in preventing threats?

A

Firewalls can prevent many different types of threats; network-based firewalls protect entire networks, while host-based firewalls protect individual systems.

58
Q

Why is the use of antivirus products strongly encouraged as a security best practice?

A

The use of antivirus products is encouraged as a security best practice to identify and protect against malware, meeting compliance requirements such as the Payment Card Industry Data Security Standard (PCI DSS).

59
Q

How do antivirus systems identify malware?

A

Antivirus systems identify malware by using the signature of known malware or by detecting abnormal activity on a system. This identification is done through various types of scanners, pattern recognition, and advanced machine learning algorithms.

60
Q

What types of threats do modern anti-malware solutions aim to detect?

A

Modern anti-malware solutions aim to detect not only viruses but also rootkits, ransomware, and spyware, providing a more holistic approach to cybersecurity.

61
Q

Besides virus protection, what additional features do many endpoint solutions include?

A

Many endpoint solutions include additional features such as software firewalls and Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) systems, extending their capabilities beyond virus protection.

62
Q

What is the primary function of a firewall in the context of computer security?

A

The primary function of a firewall in computer security is to act as a barrier that isolates network segments, preventing unauthorized access and the spread of security threats.

63
Q

How do firewalls enforce policies to enhance security?

A

Firewalls enforce policies by filtering network traffic based on a set of rules, determining which activities are allowed and which are restricted.

64
Q

Where should a firewall always be placed for optimal security?

A

A firewall should always be placed at internet gateways to control and filter traffic entering or leaving an organization’s network.

65
Q

What determines the placement of firewalls within an internal network?

A

The placement of firewalls within an internal network is determined by factors such as network zoning, segregation of different sensitivity levels, and the need to isolate high-risk activities from lower-risk ones.

66
Q

How have firewalls evolved over time to enhance security capabilities?

A

Firewalls have evolved to integrate various threat management capabilities, including proxy services, Intrusion Prevention Services (IPS), and tight integration with Identity and Access Management (IAM) environments. They operate at different layers, including Layers 2 (MAC addresses), 3 (IP ranges), and 7 (application programming interface and application firewalls).

67
Q

How does an Intrusion Prevention System (IPS) differ from an Intrusion Detection System (IDS)?

A

An IPS is a type of active IDS that not only detects attacks but also automatically attempts to block them before they reach the target systems. Unlike an IDS, the IPS is placed in line with the traffic, allowing it to choose what traffic to forward and what to block.

68
Q

What is the distinguishing feature of the placement of an IPS in the network?

A

An IPS is placed in line with the traffic, meaning that all network traffic must pass through the IPS. This enables the IPS to analyze the traffic and decide which to forward and which to block, preventing potential attacks from reaching the target.

69
Q

Why is the integration of IPS functionality into firewalls common?

A

IPS systems are most effective at preventing network-based attacks, and it is common to integrate the IPS function into firewalls. This integration enhances overall network security by combining intrusion prevention with traffic filtering capabilities.

70
Q

What are the two main types of IPS, similar to IDS?

A

Similar to IDS, there are Network-based IPS (NIPS), which monitors network traffic, and Host-based IPS (HIPS), which monitors activities on individual hosts or devices.

71
Q

How does the IPS contribute to network security in terms of attack prevention?

A

The IPS contributes to network security by actively preventing attacks from reaching target systems. It achieves this by analyzing incoming traffic, making decisions on what to allow or block, and acting in real-time to block potential threats.

72
Q
A