Cyber Security Threats Flashcards

1
Q

Social engineering

A

Impersonating someone to get to someone or get privileged info

Forms:

Phishing - mass targeted SE attack

Spear phishing - targeted SE attack

CEO fraud- attempt to command someone to do something by impersonating ceo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BOT nets and ddos

A

Bot net- controlled system of computers which can be controlled by an actor

Distributed denial of service - use of botnets to target a firm and exhaust their resources and make them unavailable for service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransome ware and crypto blockers

A

Ransome ware- malware infection that denies access to a computer until a ransom is paid

Example

Crypto blockers - encrypt files using a key which is only returned to the hostage once the ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation state actors

A

Hired by governments (license to hack)

Goal to cause chaos and undermine other countries

Advanced well planned attack’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider threats

A

Mostly employees

Motives can be unintentional or for money/revenge

Can cause substantial damage

Can provide sensitive corporate data to others or sabotage systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivists

A

Online hack groups like anonymous

Motives often reactionary as they be sad

A lot of time and resources

Ddos attacks persistent hate mobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organised crime

A

Motive to maximise income

Can be substantial damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For fun hackers

A

Script kiddies

Motives - fun and bragging rights

Capability - often limited

Ddos common methods but anything goes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steps of cyber kill chain

A

Reconnaissance - select target

Weaponisation - create remote access weapon

Delivery - send weapon to target

Exploitation - malware code triggers

Installation - installs access point (back door)

Command and control - gives hands on keyboard

Actions on objective- takes action to achieve goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How criminals hack

A

Recon

Establish foothold

Move in network

Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is there no magical solution to security

A

Negative assurance (security can not be proved )

Tools can be faulty,manipulated, circumvented

Hypponens law - if it’s smart it’s vulnerable (hardware costs gone down , computer power going up)

Human error- trust exploited, people empathetic, lazy, ignorant , lack of awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can we do

A

Spread awareness-(using tools, developing and maintaining them)

Kerckhoffs principle in cryptography- a cryptographic system should be secure even if everything about he system (except the key) is known

Shannon’s maxim- one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can we do : layers of defence

A

Castle - data base system

Guard post - identify and access management

Outer walls - firewalls and DMZ

Inner walls - system hardening mitigation’s

Guard towers - security monitoring

Assume breach:
Don’t rely on locked door secure every room m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can we do

A

Fail fast and often

Iterate fast and often:
Learn from mistakes
Be agile to changing requirements
Get feedback from audience

Align incentive structures and 
responsibility :
-one team goal
-shared responsibility 
-implement layers of defence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly