Cyber Security Flashcards

Terminology

1
Q

Blacklist

A

Used to refer to a list of banned IP addresses, application or users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whitelist

A

The exact opposite of a blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cat Fishing

A

The process of creating a fake profile in order to trick people into believing they are someone else for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

The process of proving an individual is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Mining

A

The activity of analyzing and/or searching through data in order to find items of relevance, significance of value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

This generally refers to anything that has the potential to cause our data, systems and networks harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exploit

A

A clearly defined way to breach the security of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerabilities

A

These are weakness within a system or network that can be exploited to cause us harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero Data

A

This is used to describe a threat that is unknown to security specialist and has not been addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hack Value

A

This is used to describe a target that may attract an above average level of attention from an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-Repundiation

A

This is the concept that once an action is carried out by a party it cannot be denied by that same party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic Bomb

A

A malicious code that is only triggered when a set of conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Obfuscation

A

A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honey Pot

A

A decoy or trap for hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoof

A

The act of falsifying the identity of the source of a communication or interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the CIA Triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality

A

Ensuring that data is private and accessed only by those with permission to do so. Can be achieved with the use of passwords, biometrics and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Integrity

A

Ensuring that data has not been altered in any way. Can be achieved though the use of checksums and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Availability

A

Ensuring that data is always available for access and use. Can be achieved though the use of backups, maintenance & disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTP

A

(HyperText Transfer Protocol)
Determines how web browsers and servers communicate. Uses port 80

22
Q

HTTPS

A

(HyperText Transfer Protocol Secure)
The secure version of HTTP that uses encryption. Commonly used on websites where there is an exchange of sensitive data like passwords and credit card details. Uses port 443.

23
Q

FTP

A

(File Transfer Protocol)
Governs how files and data are transferred between servers and computers. Uses port 21.

24
Q

IMAP

A

(Internet Message Access Protocol)
Used by email clients to retrieve messages. Uses port 143.

25
Q

SMTP

A

(Simple Mail Transfer Protocol)
Determines how emails are sent. Uses port 25 for plain text and port 587 for encrypted communications.

26
Q

TCP

A

(Transmission Control Protocol)
Divides a message or file into smaller packets that are transmitted over the internet and then reassembled at the destination point.

27
Q

IP

A

(Internet Protocol)
Responsible for the address of each packet so they are sent to the right destination.

28
Q

TCP/IP is decided into 4 main layers?

A
  1. Data Link Layer
  2. Internet Layer
  3. Transport Layer
  4. Application Layer
29
Q

Data Link Layer

A

Consist of protocols that operate on a link that connects host on a network e.g Ethernet.

30
Q

Internet Layer

A

Connects independent networks together e.g IP

31
Q

Transport Layer

A

Handles communication between host e.g TCP

32
Q

Application Layer

A

Standardizes data exchange for applications e.g HTTP, FTP

33
Q

Types of Hackers?

A
  1. Script Kiddies
  2. Grey Hats
  3. Black Hats
  4. White Hats
  5. Hacktivist
34
Q

Script Kiddie

A

Derogatory term used to describe unskilled hackers.

35
Q

Grey Hats

A

Use black hats techniques

36
Q

Black Hats

A

The bad guys who are highly skilled and hack for personal and financial gain.

37
Q

White Hats

A

The good guys who defend data and networks from black hats and malware.

38
Q

Hacktivist

A

Activist who hack for a social or political cause.

39
Q

Passive Reco

A

Silent reconnaissance where the target isn’t aware of it. Information gathered here included email addresses, phone numbers, social media accounts etc.

40
Q

Active Recon

A

More aggressive reconnaissance where the target is actively engaged to discover vulnerabilities. information gathered here included passwords, IP addresses, open ports, conversation with employees.

41
Q

Methods of Exploitation?

A
  1. Phishing Email
  2. Social Engineering
  3. Unpatched Software
  4. Weak Passwords
42
Q

Brute Force Attacks

A

A very violent attack where the hacker attempts to crack a password by using extremely large possible combinations of letters and numbers to guess the right combination. Can be prevented with the use of very strong passwords and timeouts after consecutive failed login attempts.

43
Q

Phishing

A

The most popular cyber attack where the victim is tricked into clicking a malicious link in an email. Spear phishing attacks are directed at very specific targets while a whaling attack is directed against senior executives of companies.

44
Q

Email Spoofing

A

This is the forgery of an email header to make it look like the message originated from someone else other than the actual source

45
Q

Botnets

A

This refers to a collection of bots (infected computers). A botmaster controls the bots and can use them to perform a DOS attack.

46
Q

DOS

A

(Denial of Service)
This is an attack where the targeted server is flooded with useless request in an attempt to overwhelm and shut it down. Can be combated by blocking the IP address of the source of the attack.

47
Q

DDOS

A

(Distributed Denial of Service)
A more sophisticated form of DOS attack. Can be prevented with bandwidth over-provision.

48
Q

Man in the middle attack

A

A crafty attack where the hacker is able to intercept and alter or steal data sent between two or more workstations. Examples of this attack include email hijacking, session hijacking and wifi eavesdropping.

49
Q

SQL Injection Attack

A

The attacker executes malicious SQL commands to try and corrupt a database. This type of attack can provide the attacker with unauthorized access to sensitive information like passwords and usernames.

50
Q
A