Cyber Security Flashcards

1
Q

What is the cyber security triad?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is integrity?

A

Guarding against improper information modification/destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the integrity-related concepts?

A

Authenticity & accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What 4 steps of cyber attack countermeasures are there?

A

Detection, prevention, mitigation, recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a checksum?

A

A function that maps file contents to a numerical value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the 5 main cyber attackers

A

Cybercriminals, nation states, hacktivists, insider threats, script kiddies/noobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relation between an instigator and a perpetrator?

A

A perpetrator can be hired/bribed by an instigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 potential motivations of Nation States?

A

Garner high quality intelligence
Sabotage critical infrastructures
Subversion e.g. political elections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 potential attacks hacktivists may perform?

A

Web defacements
Data breaches (to prove beliefs)
DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the stages of the Kill-Chain model

A

Reconnaissance, weaponisation, delivery, exploitation, installation, command & control, actions on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between exploitation & installation?

A

Exploitation: execution of payload to exploit vulnerability
Installation: ensurance of payload persistence within the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 8 cyber attacks are there?

A

Cryptojacking
Data breaches
DDoS
Influence campaigns
Money theft
Personal document ransom
Supply chain attacks
Web defacements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 3 types of money theft attacks are there and what do they involve?

A

Banking trojan horse: seemingly legitimate software captures credentials
Cyber banking fraud: attacks launched from compromised machines to transfer stolen funds
BEC (Business Email Compomise)/Whaling: attacker requests large money transfer pretending to be CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 4 steps are there in personal document ransom / ransomware?

A

1) Attacker sends email with attachment user is lured to open
2) Attachment either prompts user to execute a macro or lanuches powershell to download & execute final payload
3) Ransomware encrypts specific file types
4) Files can only be decrypted by paying a ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cryptojacking?

A

The practice of hijacking computer resources to mine cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 3 things could happen to stolen data in data breaches?

A

Public disclosure
Private intelligence
Sold on the black market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a supply chain attack?

A

Where the adversary compromises the weakest link in the supply chain to reach the target from there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Social Engineering?

A

A technique to either pschologically manipulate people into performing an action or gather information left around by people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What 3 ways is information gathered in Social Engineering?

A

Via the web (company website / social media)
Dumpster diving
Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What 4 ways may an adversary interact with the target in Social Engineering?

A

Phishing: sending emails incl. spear phishing (specific individual/organisation) & whaling (high-profile)
Vishing: using video calls
Smishing: using SMS (text)
Physical impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is baiting in Social Engineering?

A

A real-world trojan horse e.g. infected removable media, gift with wiretap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What 5 essential defences are there in corporate security?

A

Firewalls
User access control
Malware protection
Patch management
Secure configuration

Ineffective against advanced attacks e.g. SE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Firewalls

A

Sit at the edge of a network
Blocks all incoming traffic by default, inspects each packet passing through, accepts packets that satisfy rules
Allows all outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The 3 steps of secure configuration

A

Unnecessary software removed
Auto-run features disables
Default password changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

User access control

A

Ensure user accounts are only assigned to authorised individuals

1) Authenticate before granting access
2) Remove accounts when no longer required
3) Use two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 2 requirements of malware protection?

A

Anti-malware software
Application whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

(Security update) / (patch) management

A

Keep everything updated, licensed, and supported
Remove when unsupported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What 6 additional defences are there in corporate security?

A

Data protection, segregation of duties, network fragmentation, network monitoring, honeypots, pentesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the 4 ways of protecting data?

A

Encrypting data
Fragmenting data (split & store in diverse locations)
Backing-up data
Privacy protection (removing PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the benefit of segregating a task?

A

If N accounts required to execute a task, N accounts must be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Give an example of network fragmentation

A

e.g. Front-end, back-end, office, and Internet split with access between managed with firewalls at bboundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network monitoring

A

Uses intrusion detection systems (signature-based & anomaly-based) and intrusion prevention systems
Observes & records all traffic on network
Alerts on suspicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Honeypots (4 types)

A

A decoy to lure attackers
Research HPs: gather info about attackers (broader trends)
Production HPs: detect & deflect attackers from CIs
High-Interaction HPs: gain detailed insights into attacker behaviour (specific attacker behaviour)
Low-Interaction HPs: detect & deflect automated attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pentesting (6 phases)

A

An authorised simulated attack to assess the system’s security
1) Pre-engagement interactions - goals definition
2) Inteligence gathering - security mechanisms used
3) Threat modelling - how target can be attacked
4) Vulnerability analysis
5) Exploitation - actual attack
6) Post exploitation - what to do once compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What makes an attack an APT?

A

If its advanced, persistent, and a threat
If it’s targeted and nation-state supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Critical Infrastructures?

A

Facilities, systems, sites, information, people, networks, and processes that are necessary for a country to function and on which daily life depends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the impact of losing a Critical Infrastructure?

A

Major detrimental impact on availability, delivery, and integrity of essential services
Severe economic/social consequences
Potential loss to life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are Industrial Control Systems?

A

Systems that control & monitor CIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What 6 reasons are there for damaging CIs with malware rather than with an air strike?

A

Lower development costs
No casualties
No loss of employed weapons/equipment
Less chance of severe retaliation
Almost speed of light attacks
Anonymous / no attribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the 6 hacktivism ethics?

A

1) Everyone should have unrestricted access to computers
2) Information should be free
3) Authorities can’t be trusted
4) Hackers should solely be judged on ability
5) Hacking is considered an act of art
6) Computers are a positive phenomenon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What actors are involved in cyberwarfare?

A

Nation states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the 3 objectives of cyberwarfare?

A

Espionage: steal sensitive information from government to gather intelligence
Sabotage: disrupt/damage CIs
Propaganda: influence public opinion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Why is cyberwarfare not considered to be warfare?

A

There is no use of physical force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is symmetric encryption?

A

The same key is used to encrypt & decrypt a piece of information
The key is shared between sender & recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is asymmetric encryption?

A

Each user has a private key and a public key
Sender encrypt with recipient’s public key
Recipient decrypts with its own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a digital signature?

A

A form of asymmetric encryption
Sender encrypts with its own private key
Recipient decrypts with sender’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a key ring?

A

All the public keys a sender/recipient has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does a hash function do?

A

Converts in input into a fixed size string of bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What 2 ways are there to initially exchange keys?

A

Public key encryption
Diffie-Hellman key exchange protocol

50
Q

How does public key encryption work?

A

Sender sends their public key and identity (PUa, IDa)
Receiver sends sender’s public key and a secret key encrypted Enc[PUa, Ks]

51
Q

How is public key encryption vulnerable to man-in-the-middle attacks?

A

Man in the middle attacks
MITM forwards sender’s message to receiver but with their own public key
MITM receives secret key and forwards message to sender, replacing their public key with the senders to avoid detection

52
Q

How does the Diffie-Hellman key exchange protocol work?

A

1) A & B agreed publically on a prime modulus (e.g. 3) and a generator (e.g. 17)
2) A selects a private random number (e.g. 15) and calculates (3^15)mod17 = 6 and sends result publically
3) B selects a private random number (e.g. 13) and calculates (3^13)mod17 = 12 and sends result publically
4) A takes B’s public result, 12, and own private number, 15, and calculates (12^15)mod17 = 10 to obtain shared secret
5) B takes A’s public result, 6, and own private number, 13, and calculates (6^13)mod17 = 10 to obtain shared secret

53
Q

How is the Diffie-Hellman key exchange protocol vulnerable to man-in-the-middle attacks?

A

1) MITM generates 2 private keys PUx & PUy and calculates 2 public keys PRx = (a^PUx)modq and PRy = (a^PUy)modq
2) MITM intercepts A’s public key PUa before it reaches B and creates a secret key for A, Ka = (PUa^PRy)modq
3) MITM transmits public key PUx to B in place of PUa
4) B calculates secret key K1 = (PUx^PRb)modq
5) MITM intercepts B’s public key PUb before it reaches A and creates a secret key for B, Kb = (PUb^PRx)modq
6) MITM transmits public key PUy to A in place of PUb
7) A calculates secret key K2 = (PUy^PRa)modq
8) Now MITM can decrypt messages using Ka and encrypt with Kb

54
Q

How can Diffie-Hellman man-in-the-middle attacks be prevented?

A

With a digital certificate: users/companies are bound to their public key

55
Q

What is the function of a Public Key Infrastructure?

A

To create, manage, store, distribute, and revoke digital certificates
Enables secure, convenient, efficient acquisition of public keys

56
Q

What are the 4 key players in PKIs?

A

Certification authorities
Registration authorities
PKI repositories
PKI users

57
Q

What do Certification Authorities (PKI) do?

A

Issues, revokes, and distributes certificates
Certificates signed with CA’s private key so authenticity can be checked using CA’s public key

58
Q

What do Registration Authorities (PKI) do?

A

Approves/rejects certificate applications
Renews (re-keys), revokes, and suspends certificates

59
Q

What to PKI repositories do?

A

Store & distribute certificates and certificate revocation lists

60
Q

What 4 reasons might there be for a certificate to be revoked?

A

Compromised private key
Certificate expiration
Human resources reason
Name/address/DNS change

61
Q

What 3 issues are there with Certificate Revocation Lists?

A

Issued too infrequently to be effective against attackers
Expensive to distribute
Vulnerable to DoS attacks

62
Q

Secure sockets layer vs transport layer security

A

Cyptographic protocols
TLS improves upon SSL by providing privacy & data integrity between communication applications

63
Q

What 4 steps are there in a handshake protocol?

A

1) Client hello (protocol version, supported cryptographic algorithms)
2) Server hello (highest protocol version, strongest cryptographic algorithm)
3) Server key exchange: client receives server’s certificate and verifies the CA private key with the CA public key
4) Client key exchange

64
Q

What is Kerberos?

A

A network authentication protocol that relies on symmetric encryption

65
Q

What are the 4 aims of Kerberos?

A

User password shouldn’t have to travel over network
User password shouldn’t be stored on client’s machine
User is only asked to enter password once per work session
Authentication information management is centralised and resides on authentication server

66
Q

What are Kerberos tickets?

A

Issued by authentication server
Encypted witht the secret key of the service it’s intended for
Used as proof presented by a user to an application server to demonstrate their identity and gain access to that service on the network

67
Q

What is the key distribution centre in Kerberos?

A

A centralised model containing the database, authentication server, and ticket granting server

68
Q

What are the 6 steps in accessing a service in Kerberos?

A

1) User requests a ticket-granting-ticket from the authentication server
2) AS sends the session key and the TGT to the user
3) User requests access to a particular server from the ticket granting server using the TGT
4) TGS sends a session key and the ticket-for-service
5) User requests the service from the application server using the TfS
6) Application server grants the service

69
Q

What 4 limitations does Kerberos have?

A

Single point of failure as if KDC server is down, no-one can log in
Vulnerable to password guessing attacks
Requires clocks to be synchronised
Has to assume user’s workstation is secure

70
Q

What 5 attacks is password-based authentication vulnerable to?

A

Password cracking (brute force attack, dictionary attack)
Electronic monitoring (network sniffing, keyloggers)
Workstation hijacking
Shoulder-surfing
Dumpster-diving

71
Q

What are the 3 drawbacks of token-based authentication?

A

Requires a special read - added cost
Token loss - loss of access, added cost, stealing
User dissatisfaction

72
Q

What are the 2 types of biometric authentication?

A

Static: fingerprints, hands, face, retina/iris
Dynamic: voice, signature

73
Q

What are the 3 drawbacks of multi-factor authentication?

A

User must carry physical token at all times
Risk of loss or theft –> replacement cost
Unscalable: new token required for each new account/system

74
Q

What 5 measures are there for preventing online password cracking?

A

Password policies
Password blacklists
Machine-generated passwords
Force regular password changes
Throttling - time delay between consecutive failed login attempts

75
Q

What’s the issue with hash dictionaries?

A

The size - good dictionaries can be 100s of TBs

76
Q

What is a rainbow table?

A

A precomputed table used to crack password hashes
Has a good trade-off between time and space

77
Q

What is password salting?

A

A way to avoid reverse password attacks

78
Q

What are the 3 steps of password salting?

A

1) Append/prepend a random salt to the password
2) Compute the hash of the password and the salt
3) Store the hash of the salted password and the salt

79
Q

What are the 2 benefits of password salting?

A

Prevents duplicate password visibility
Increase difficulty of offline dictionary attacks by factor 2^b for salt of b bits

80
Q

What are the 4 group of harmful activities in Solove’s Taxonomy of Privacy

A

Information Collection
Informaiton Processing
Information Dissemination (distribution)
Invasions

81
Q

What are the 2 harmful types of information collection (Solove)?

A

Surveillance: surveilling an individual’s activies
Interrogation: probing for information

82
Q

What are the 4 harmful types of information processing (Solove)?

A

Aggregation: combining pieces of data about a person
Identification: linking information to individuals
Insecurity: carelesseness in protection stored information
Secondary use: use of data for a different purpose without subject’s consent

83
Q

What are the 7 harmful types of information dissemination?

A

Appropriation (use of one’s information for purpose of another)
Breach to confidentiality
Blackmail
Distortion
Disclosure
Exposure (of physical/emotional attributes)
Increased accessibility

84
Q

What are the 3 research paradigms in Privacy Enhancing Technologies?

A

Privacy as confidentiality
Privacy as control
Privacy as practice

85
Q

What are quasi-identifiers?

A

Attributes that, when combined with other quasi-identifiers, create unique identifiers

86
Q

What are the 4 techniques for data anonymisation?

A

K-anonymity
L-diversity
T-closeness
Differential privacy

87
Q

What is K-anonymity?

A

Attributes are generalised into broader categories (e.g. age as >40) and/or suppressed (e.g. age as 2* for 28)
At least K records have the same values for quasi-identifiers

88
Q

What 2 attacks is K-anonymity vulnerable to?

A

Homogeneity attack: if values in a QI group lack diversity e.g. all age 5* people at postcode 476*** have heart disease
Background knowledge attack

89
Q

What is L-diversity?

A

Each QI group must contain at least L different sensitive attributes e.g. in a group with 3 attributes, its sufficient to have flu, shingles, or acne as the sensitive data

90
Q

What 2 attacks is L-diversity vulnerable to?

A

Skewness attack: doesn’t consider overall distribution of sensitive values e.g. instead of 1/1000 chance of heart disease, now 1/3
Similarity attack: if sensitive attributes in a 3-diverse are lung cancer, liver cancer, and stomach cancer, attack can infer patient has cancer

91
Q

What is T-closeness?

A

The distance between the distribution of a sensitive attribute in all QI groups and the distribution of the sensitive attribute in the whole table is at most T

92
Q

Proxy vs VPN

A

Similarities: both hide IP addresses, connection between proxy/VPN and end points aren’t encrypted
Differences: VPN encrypts connection with VPN node, proxy doesn’t encrypt connection

93
Q

What is onion routing?

A

Where (TCP) traffic is protected with multiple layers of encryption

94
Q

What is traffic mixing?

A

Mixes messages with other traffic
To allow responses, the sender places keys at each mix along the path when established

95
Q

What is dummy traffic?

A

Meaningless traffic inserted alongside genuine data to obscure the real communication

96
Q

What is Perfect Forward Secrecy?

A

Minimises risk to PI in event of encryption key breach
Each session’s key is unique and not re-usable

97
Q

What is access control and its 3 components?

A

The process of regulating system resources according to a security protocol

Authentication: verify user credentials are valid
Authorisation: grant permission to an entity to access a system resource
Audit: review & examine system activities

98
Q

What are the 3 foundations of access control?

A

Object: the resource to which access is controlled
Subject: an entity that can access objects
Access right: the way a subject may access an object (read, write, execute, delete, create, search)

99
Q

What are the three subject classes (access control)?

A

Owner: full control over object
Group: multiple users with similar access permissions to objects
World: all subjects that aren’t the owner or part of a group

100
Q

What 3 things are Access Control Models used for?

A

Defining a set of authorisation rights
Defining a set of policies to enforce the authorisation rights
Protecting systems against violations of confidentiality, integrity, and availability

101
Q

What are the 4 main Access Control Models?

A

Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
Attribute-Based Access Control

102
Q

What are blockchains?

A

Systems that keep track of transactions securely across a network of computers without the need of a central authority e.g. cryptocurrency doesn’t require a bank

103
Q

What is double spending in blockchains?

A

When 2+ transactions use the same input

104
Q

What is proof of work (briefly)?

A

A way to mitigate double spending in blockchains

105
Q

What is a block of transactions?

A

A batch of submitted & confirmed transactions stored as a list
Each block also references the previous block so any changes require updating all following blocks
Each block also includes a random number

106
Q

What are miners?

A

Nodes that create new blocks

107
Q

What are the 4 steps a miner takes?

A

1) Chooses the transactions to include in a block
2) Chooses the previous block
3) Competes with other miners to solve a puzzle based on the data in the block and the previous block’s hash
4) Once solved, broadcasts proposed block for solution verification and block addition

108
Q

What puzzle are miners trying to solve?

A

Finding a number such that the hash of the whole block has at least a certain number of zeros as most significant digits
The more zeros, the harder the mining

109
Q

What 3 reasons are there for miners to mine over the longest chain/branch?

A

There is a network consensus so more cumulative work
There are higher rewards
There is more security

110
Q

What is branch resolution?

A

Where a generated block can be rolled back and transactions are cancelled
To avoid risk of double spending, wait for other six blocks before confirming txn

111
Q

What is hashpower?

A

The number of hash computed per second
The probability of a miner generating a new block is proportional to its hashpower

112
Q

What are mining pools?

A

Organised groups of miners
Have a collectively larger hashpower so a higher probability to mine blocks

113
Q

What are the 3 advantages of blockchains?

A

Trustless network
Immutable transaction history
No single point of failure

114
Q

What are the 3 disadvantages of blockchains?

A

High transaction fees
Slow transaction confirmation
Not yet stabilised currency

115
Q

What is a smart contract?

A

A computerised transaction protocol that executes the terms of a contract

116
Q

Node joining in permissionless/permissioned blockchains

A

Permissionless: any node can join the network
Permissioned: nodes need to be authorised to join the network

117
Q

Security in permissionless/permissioned blockchains

A

Permissionless: need to target thousands of miners to make unavailable
Permissioned: need to traget fraction of peers

118
Q

Stability in permissionless/permissioned blockchains

A

Permissioned blockchains aren’t based on cryptocurrencies so are more stable

119
Q

Transaction fees in permissionless/permissioned blockchains

A

Permissioned blockchains don’t require any transaction fees

120
Q

Decentralisation in permissionless/permissioned blockchains

A

Permissioned blockchains are inherently less decentralised

121
Q

Setup & maintenance in permissionless/permissioned blockchains

A

Permissionless: convenient, contained cost
Permissioned: costly