Cyber Sec Exam Flashcards
Ransomware
Encrypts data then demands payment or information in order to receive it back
Keylogger
Tracks Keystrokes
Spyware
Monitors devices secretly and potential control of the device in places
Phishing
Steals information from people while pretending to be something else
Stealth Backdoor
Entering through intentional holes in the system left by attackers to secretly bypass security procedures
Rootkit
A set of programs installed on a system to maintain covert access to that
system with administrator (or root) privileges
Attack Agents
Take over another internet attached computer and use it to attack
Payload
The main action that the virus or malware is built to carry out
Clickjacking
Clickjacking is a malicious technique used by attackers to trick users into clicking on something different from what they perceive they are clicking on
Malvertising
Malware placed on websites without infecting them typically in advertisements.
Drive-by downloads
This type of attack typically occurs when a user visits a compromised or malicious website, and the malicious code is automatically downloaded and executed in the background. This exploits issues in the browser or OS.
Watering Hole attacks
A targeted form of a drive-by download
Trojan
Malware that disguises itself as a not malicious program
Worms
Seeks out other files while infecting as much as possible. Can spread through network connections and files based on the goal condition that is set for it.
Metamorphic virus
A virus that mutates and rewrites itself completely at each iteration and may change behavior as well as appearance.
Polymorphic virus
A virus that mutates with every infection
Stealth virus
A form of virus explicitly designed to hide itself from detection by anti-virus software.
Encrypted virus
A portion of the virus creates a random encryption key and encrypts the remainder of the virus
Virus
Infects software and modifies, replicates and spreads upon a condition being met. Examples such as logic bombs
Logic Bomb
A virus which activates upon certain conditions being met such as a date/time.
Attack Kit
Malware kits used to create malware. Examples such as Zeus and Angler
What is the difference between worms, viruses and Trojans?
how they spread
What is social engineering
“tricking” users to assist in the compromise of their own systems or personal
information. This can occur when a user views and responds to some SPAM
e-mail, or permits the installation and execution of some Trojan horse program or
scripting code. E.g trojans, spam
Brute Force
Guessing every individual combination of a password or key till the correct combination has been found
What is a hash function and what do they do?
The purpose of a hash function is to produce a “fingerprint” of a file, message, or other block of data.
Ensures file integrity, increases security.
Rainbow Table
Logs common passwords and the corresponding pre-computed hashes from dictionary’s on a table. When receiving a hashed password they can then find the corresponding plaintext.
Dictionary Attack
Systematically attempting to guess a password or key based on the most likely possibilities.
Authenticity
making sure people are who they say they are
Authorization
determines whether an entity or person is permitted to access information
Accountability
intrusion detection and prevention and after-action recovery and legal action
Plaintext
the original data
Encryption algorithm
Performs various actions on the plaintext to warp it and make it harder to guess
Secret Key
the key used to decrypt the ciphertext
Ciphertext
The plaintext after the algorithm has been applied to it
Decryption Algorithm
works in the opposite way to the encryption algorithm
Symmetric encryption
Uses a single key for both encryption and decryption.
Asymmetric encryption
Asymmetric encryption, also known as public-key encryption, uses a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. The public key can be freely distributed, while the private key is kept secret. Messages encrypted with the public key can only be decrypted by someone who possesses the corresponding private key.
Cost benefit analysis
Weighs whether an option is worth it or not
What should an IT security plan include:
What will be done, what resources and who is responsible.
Name the 3 Control Classifications
Management, Operational and Technical.
Management control
focuses on the policies, planning and guidelines