Cyber Security Flashcards
What is the cyber security triad?
Confidentiality, integrity, availability
What is integrity?
Guarding against improper information modification/destruction
What are the integrity-related concepts?
Authenticity & accountability
What 4 steps of cyber attack countermeasures are there?
Detection, prevention, mitigation, recovery
What is a checksum?
A function that maps file contents to a numerical value
List the 5 main cyber attackers
Cybercriminals, nation states, hacktivists, insider threats, script kiddies/noobs
What is the relation between an instigator and a perpetrator?
A perpetrator can be hired/bribed by an instigator
What are 3 potential motivations of Nation States?
Garner high quality intelligence
Sabotage critical infrastructures
Subversion e.g. political elections
What are 3 potential attacks hacktivists may perform?
Web defacements
Data breaches (to prove beliefs)
DDoS
List the stages of the Kill-Chain model
Reconnaissance, weaponisation, delivery, exploitation, installation, command & control, actions on objectives
What is the difference between exploitation & installation?
Exploitation: execution of payload to exploit vulnerability
Installation: ensurance of payload persistence within the target
What 8 cyber attacks are there?
Cryptojacking
Data breaches
DDoS
Influence campaigns
Money theft
Personal document ransom
Supply chain attacks
Web defacements
What 3 types of money theft attacks are there and what do they involve?
Banking trojan horse: seemingly legitimate software captures credentials
Cyber banking fraud: attacks launched from compromised machines to transfer stolen funds
BEC (Business Email Compomise)/Whaling: attacker requests large money transfer pretending to be CEO
What 4 steps are there in personal document ransom / ransomware?
1) Attacker sends email with attachment user is lured to open
2) Attachment either prompts user to execute a macro or lanuches powershell to download & execute final payload
3) Ransomware encrypts specific file types
4) Files can only be decrypted by paying a ransom
What is cryptojacking?
The practice of hijacking computer resources to mine cryptocurrency
What 3 things could happen to stolen data in data breaches?
Public disclosure
Private intelligence
Sold on the black market
What is a supply chain attack?
Where the adversary compromises the weakest link in the supply chain to reach the target from there
What is Social Engineering?
A technique to either pschologically manipulate people into performing an action or gather information left around by people
What 3 ways is information gathered in Social Engineering?
Via the web (company website / social media)
Dumpster diving
Shoulder surfing
What 4 ways may an adversary interact with the target in Social Engineering?
Phishing: sending emails incl. spear phishing (specific individual/organisation) & whaling (high-profile)
Vishing: using video calls
Smishing: using SMS (text)
Physical impersonation
What is baiting in Social Engineering?
A real-world trojan horse e.g. infected removable media, gift with wiretap
What 5 essential defences are there in corporate security?
Firewalls
User access control
Malware protection
Patch management
Secure configuration
Ineffective against advanced attacks e.g. SE
Firewalls
Sit at the edge of a network
Blocks all incoming traffic by default, inspects each packet passing through, accepts packets that satisfy rules
Allows all outbound traffic.
The 3 steps of secure configuration
Unnecessary software removed
Auto-run features disables
Default password changed
User access control
Ensure user accounts are only assigned to authorised individuals
1) Authenticate before granting access
2) Remove accounts when no longer required
3) Use two-factor authentication
What are the 2 requirements of malware protection?
Anti-malware software
Application whitelisting
(Security update) / (patch) management
Keep everything updated, licensed, and supported
Remove when unsupported
What 6 additional defences are there in corporate security?
Data protection, segregation of duties, network fragmentation, network monitoring, honeypots, pentesting
What are the 4 ways of protecting data?
Encrypting data
Fragmenting data (split & store in diverse locations)
Backing-up data
Privacy protection (removing PII)
What is the benefit of segregating a task?
If N accounts required to execute a task, N accounts must be compromised
Give an example of network fragmentation
e.g. Front-end, back-end, office, and Internet split with access between managed with firewalls at bboundaries
Network monitoring
Uses intrusion detection systems (signature-based & anomaly-based) and intrusion prevention systems
Observes & records all traffic on network
Alerts on suspicious traffic
Honeypots (4 types)
A decoy to lure attackers
Research HPs: gather info about attackers (broader trends)
Production HPs: detect & deflect attackers from CIs
High-Interaction HPs: gain detailed insights into attacker behaviour (specific attacker behaviour)
Low-Interaction HPs: detect & deflect automated attacks
Pentesting (6 phases)
An authorised simulated attack to assess the system’s security
1) Pre-engagement interactions - goals definition
2) Inteligence gathering - security mechanisms used
3) Threat modelling - how target can be attacked
4) Vulnerability analysis
5) Exploitation - actual attack
6) Post exploitation - what to do once compromised
What makes an attack an APT?
If its advanced, persistent, and a threat
If it’s targeted and nation-state supported
What are Critical Infrastructures?
Facilities, systems, sites, information, people, networks, and processes that are necessary for a country to function and on which daily life depends
What is the impact of losing a Critical Infrastructure?
Major detrimental impact on availability, delivery, and integrity of essential services
Severe economic/social consequences
Potential loss to life
What are Industrial Control Systems?
Systems that control & monitor CIs
What 6 reasons are there for damaging CIs with malware rather than with an air strike?
Lower development costs
No casualties
No loss of employed weapons/equipment
Less chance of severe retaliation
Almost speed of light attacks
Anonymous / no attribution
What are the 6 hacktivism ethics?
1) Everyone should have unrestricted access to computers
2) Information should be free
3) Authorities can’t be trusted
4) Hackers should solely be judged on ability
5) Hacking is considered an act of art
6) Computers are a positive phenomenon
What actors are involved in cyberwarfare?
Nation states
What are the 3 objectives of cyberwarfare?
Espionage: steal sensitive information from government to gather intelligence
Sabotage: disrupt/damage CIs
Propaganda: influence public opinion
Why is cyberwarfare not considered to be warfare?
There is no use of physical force
What is symmetric encryption?
The same key is used to encrypt & decrypt a piece of information
The key is shared between sender & recipient
What is asymmetric encryption?
Each user has a private key and a public key
Sender encrypt with recipient’s public key
Recipient decrypts with its own private key
What is a digital signature?
A form of asymmetric encryption
Sender encrypts with its own private key
Recipient decrypts with sender’s public key
What is a key ring?
All the public keys a sender/recipient has
What does a hash function do?
Converts in input into a fixed size string of bytes