Cyber security Flashcards
What is security?
Measures and control that ensure confidentiality, integrity and availability of information system assets, including hardware, software, firmware, and information being processed, stored and communicated. CIA triangle → Information security is confidentiality, integrity and availability. The CIA protects the assets (hardware, software information, etc).
What is information security?
Information security is generally defined as the preservation of the confidentiality, integrity and availability of information. Other characteristics such as authenticity, accountability, non-repudiation and reliability are also information security.
What does Adversity (threat agent) mean?
an individual group, organization or government that engages in or has access to the internet to engage in harmful activities.
Threat
any circumstances or events with the potential to negatively affect organisational operations (including mission, functions, image, or reputation), organisational assets, individuals, other organizations, or Nation through an information system via unauthorized access, destruction, disclosure, modification or any information, and/or denial of service.
Vulnerability
weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
System resource (asset)
hardware, software, communication network, data, major applications, general support system, high-impact program, physical plant, mission-critical system, staff, equipment, or a logically related group of systems.
Attack
any kind of malicious activity that attempts to collect, disrupt, deny, degrade or destroy information system resources or the information itself.
Risk
a measure of the extent to which a potential circumstance or event threatens an organization. We consider (1) the impact that would arise if the circumstance or event occurs; (2) the likelihood of the event occurring.
Security policy
A set of criteria or rules for the provision of security services. It defines and limits the activities of a data processing facility to maintain a state of security of systems and data. E.g. password rules → security policy (password policy).
Active attack
an attempt to alter system resources or affect their operation. E.g., DoS, DDoS, session hijacking, etc.
Passive attack
An attempt to learn or use information from the system that does not affect the system’s resources. E.g. eavesdropping, keystroke logging, etc.
What is meant by countermeasures?
the steps or measures you can take to prevent or manage attacks. The three countermeasures are prevent, detect and recover.
What is privacy?
is the claim of individuals, groups, or institutions to determine how, when, and to what extent their personal information should be communicated to others. Privacy is an individual interest in sustaining a personal space that is free from intrusion from any organisation or people.
Name the four states of privacy
-Solitude: the state of being free from observation by others.
-Intimacy: the privacy required for a close association.
-Anonymity: the condition of being unknown and free from identification.
-Reserve: the desire to limit disclosures to others.
Name a data privacy law and regulation
GDPR. Strengths and unifies data protection for individuals within the European Union. Personal data shall be, Processed following the purpose of collection. Processed in a way that is lawful, fair and transparent. Processed in a manner that ensures integrity and confidentiality. Processed by the consent of data subjects.
Types of malware
Stuxnet, Mirai, Mushtik and Mozi.
What is Stuxnet?
Stuxnet is malicious software. Stuxnet targets Windows systems and Windows-based Siemens software used in industrial control systems.
What is Mirai?
series of DDoS attacks that targeted domain name system (DNS) providers known as Dyn. About 100,000 IoT devices are used to create DDoS attacks. When the devices are infected they become zombies (botnet). The botnet targets various internet-connected devices like printers, IP cameras, residential gateways, baby monitors, and others.
What is Mushtik?
use web application exploits to hinder IoT devices, including cloud security enterprise lacework for Drupal and Oracle Weblogic. It is a multistage attack and a variant of Mirai.
What is Mozi?
peer-to-peer botnet targeting IoT devices such as network gateways and digital video records. Includes source code from Mirai, IoT Reaper, and the Gafgyt. Works by exploiting weak telnet passwords and unpatched IoT vulnerabilities. Conduct DDoS attacks, data exfiltration, and command or payload execution.
DoS
Denial of Service. The DoS attack consists of overloading a server using a computer. A large amount of traffic is sent over the network to shut down specific devices and networks so they can no longer be used.
DDoS
Distributed Denial of Service. They are created using different devices that are interconnected and controlled by the hacker/botmaster via a server. These botnets can be a few bots or several hundred. Another word for devices connected to botnets is zombies. Attack through multiple devices (zombies) on one device.
Attack flow of Mozi botnet
- Internet scan.
- Identify targets.
- Exploit path.
- Deploy Mozi.
- Enable persistence.
- Maintain persistence.
- Block remediation.
- Deploy exploit kit.
- Increase target spread.
- Demand ransom.
Name a method/tool used to identify security vulnerabilities in IoT devices
Port scanning. A method of examining a device or server by checking which ports are open, closed or filtered. This can reveal what services are running on a device, such as web services (port 80 for HTTP), secure connections (port 443 for HTTPS), remote control (port 22 for SSH), and so on.