Cyber Sec Exam Flashcards

1
Q

Ransomware

A

Encrypts data then demands payment or information in order to receive it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keylogger

A

Tracks Keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

Monitors devices secretly and potential control of the device in places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Steals information from people while pretending to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stealth Backdoor

A

Entering through intentional holes in the system left by attackers to secretly bypass security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

A set of programs installed on a system to maintain covert access to that
system with administrator (or root) privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack Agents

A

Take over another internet attached computer and use it to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Payload

A

The main action that the virus or malware is built to carry out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clickjacking

A

Clickjacking is a malicious technique used by attackers to trick users into clicking on something different from what they perceive they are clicking on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malvertising

A

Malware placed on websites without infecting them typically in advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drive-by downloads

A

This type of attack typically occurs when a user visits a compromised or malicious website, and the malicious code is automatically downloaded and executed in the background. This exploits issues in the browser or OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering Hole attacks

A

A targeted form of a drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan

A

Malware that disguises itself as a not malicious program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Seeks out other files while infecting as much as possible. Can spread through network connections and files based on the goal condition that is set for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Metamorphic virus

A

A virus that mutates and rewrites itself completely at each iteration and may change behavior as well as appearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Polymorphic virus

A

A virus that mutates with every infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stealth virus

A

A form of virus explicitly designed to hide itself from detection by anti-virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encrypted virus

A

A portion of the virus creates a random encryption key and encrypts the remainder of the virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virus

A

Infects software and modifies, replicates and spreads upon a condition being met. Examples such as logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logic Bomb

A

A virus which activates upon certain conditions being met such as a date/time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attack Kit

A

Malware kits used to create malware. Examples such as Zeus and Angler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between worms, viruses and Trojans?

A

how they spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is social engineering

A

“tricking” users to assist in the compromise of their own systems or personal
information. This can occur when a user views and responds to some SPAM
e-mail, or permits the installation and execution of some Trojan horse program or
scripting code. E.g trojans, spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Brute Force

A

Guessing every individual combination of a password or key till the correct combination has been found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a hash function and what do they do?
The purpose of a hash function is to produce a “fingerprint” of a file, message, or other block of data. Ensures file integrity, increases security.
26
Rainbow Table
Logs common passwords and the corresponding pre-computed hashes from dictionary's on a table. When receiving a hashed password they can then find the corresponding plaintext.
27
Dictionary Attack
Systematically attempting to guess a password or key based on the most likely possibilities.
28
Authenticity
making sure people are who they say they are
29
Authorization
determines whether an entity or person is permitted to access information
30
Accountability
intrusion detection and prevention and after-action recovery and legal action
31
Plaintext
the original data
32
Encryption algorithm
Performs various actions on the plaintext to warp it and make it harder to guess
33
Secret Key
the key used to decrypt the ciphertext
34
Ciphertext
The plaintext after the algorithm has been applied to it
35
Decryption Algorithm
works in the opposite way to the encryption algorithm
36
Symmetric encryption
Uses a single key for both encryption and decryption.
37
Asymmetric encryption
Asymmetric encryption, also known as public-key encryption, uses a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. The public key can be freely distributed, while the private key is kept secret. Messages encrypted with the public key can only be decrypted by someone who possesses the corresponding private key.
38
Cost benefit analysis
Weighs whether an option is worth it or not
39
What should an IT security plan include:
What will be done, what resources and who is responsible.
40
Name the 3 Control Classifications
Management, Operational and Technical.
41
Management control
focuses on the policies, planning and guidelines
42
Operational controls
Address the correct implementation and use of security policies. Relate to people rather than systems
43
Technical Controls
involve the correct use of hardware and software security in systems.
44
Supportive controls
Pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls
45
Preventative controls
Focus on preventing security breaches from occurring, by inhibiting attempts to violate security policies or exploit a vulnerability
46
Detection and recovery controls
Focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources
47
Residual Risk
Lowering likelihood, impact or capability reduces the level of a risk
48
What does a Implementation Plan consist of
security plan documents, identified personnel and authorization for the system to be used.
49
is security management cyclical?
Yes and it needs to be constantly monitored and evaluated
50
Security Compliance
audit process to review security processes and ensure they are up to standard
51
Change management
the process used to review proposed changes to systems for implications on the organization’s systems and use.
52
IT security management
A process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.
52
Configuration management
specifically keeping track of the configuration of each system in use and the changes made to each
53
What does PDCA stand for?
Plan, do, check and act
54
Whatis mandatory to implement Management Support
Needs senior management, a security officer
55
What makes up a security risk assessment?
critical component of process, ideally examine every organizational asset, approach to mitigate the risks
56
Baseline Approach
Use industry best practice to implement agreed controls against common threats
57
Informal approach
Informally analyze a it system and make quick judgements
58
What are the pros and cons of Detailed risk analysis
Most comprehensive approach but takes the longest and costs the most
59
combined approach
hybrid of all 4 other analysis methods
60
Asset
A system resource or capability of value
61
Threat
A potential for a threat source to exploit a vulnerability
62
Vulnerability
A flaw or weakness in a assets design
63
Risk
The potential for loss
64
Risk appetite
the level of risk which is considered acceptable
65
What is important with regards to the context of an organization
the political and social environment they are in.
66
formula for risk
Risk = probability threat occurs x cost to organization
67
Logical Security
Protects computer-based data from software-based and communication-based threats
68
Physical Security
Also called infrastructure security Protects the information systems that contain data and the people who use, operate, and maintain the systems Must prevent any type of physical access or intrusion that can compromise logical security. Physical Security can also cover premises security
69
3 types of threats based on physical security
environmental, human and technical
70
what could water damage cause
electrical shortage
71
how can chemical, radiological and biological be caused?
Accidental discharges, flooding
72
How can dust collect and impact?
blocks ventilation and can be caused by windstorms and maintenance
73
Infestation
Humidity can cause mold and mildew, also insects can be dealt with pest control
74
List the main technical threat
Power utility problems from incorrect amount of voltages
75
Name some human caused threats
theft, vandalism, misuse of resources
76
How to mitigate water damage
Cloud computing, manage lines, cutoff sensors and equipment location
77
how to mitigate fire and smoke?
alarms, fire mitigation, smoke detectors, no smoking policy
78
How to mitigate human based threats
Restrict building access, lock entry points, intruder sensors, the standards
79
Recovery from security breaches
Ensure data is backed up, may require specialists to deal with damage to equipment
80
Security audit
A review of system records and activities to ensure system controls are up to standard and adjust it accordingly based on any issues
81
Audit Trail
A chronological record of system activities
82
What is needed for event detection?
monitoring software, analysis software as well as hooks and analysis software hooked up
83
What to audit
anything relating to access of the system, security mechanisms and the auditing software itself
84
what are physical audit trails
key card system, logs access attempts as well as date/time info for example
85
how to protect audit trail data
read write file on host, write once/read many device. Write only device. Implement CIA
86
Logging
Software with hooks which trigger data collection and predetermined events
87
what are the 3 types of event logs
system application security
88
Name methods of authentication
biometrics, pins, key
89
Biometrics
Something completely unique to you such as anamtomy, handwriting or voice
90
Name behavioural biometrics
voice, handwriting
91
name physiological biometrics
fingerprints, veins, retina
92
Confusion matrices
false positives/negatives in information retrieval
93
3 types of authentication architecture
transparent, continuous and convenient
94
Transparent architecture
* Non-intrusive * Maintains usability * Seamless experience for the end-use
95
Continuous Architecture
* improved security for mobile devices * Multi-modal transparent authentication architectur
96
Convenient authentication
Application specific authentication
97
Confidence level
Due to the fact biometrics are not perfect there is a threshold of error which it has with regards to a match to determine if it authorises
98
Feature Extraction
the process of collecting the biometric data via specialist technology e.g sensors
99
Discretionary Access Control
Based on identity of the requestor and on access rules stating what the requestors are allowed to do
100
Role based access control (RBAC)
Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles
101
Mandatory access control (MAC)
Controls access based on comparing security labels with security clearances
102
Attribute-based access control (ABAC)
Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions