Cybersecurity Fundamentals Flashcards
NIST: The Official publication series for standards and guidelines
FIPS
Any potential danger to an asset
threat
A weakness in the system, design, implementation, software, or code, or the lack of a mechanism.
Vulnerability
refers to a piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system
Exploit
Referred to as the knowledge about an existing or emerging threat to assets, including networks and systems.
Threat Intelligence
An express language designed for sharing of cyber-attack information. Details can contain data such as the IP addresses or domain names of command and control servers, malware hashes, and so on.
Structured Threat Information eXpression (STIX)
An open transport mechanism that standardizes the automated exchange of cyber-threat information. TAXII was originally developed by MITRE and is now maintained by OASIS.
Trusted Automated eXchange of Indicator Information (TAXII)
Free Standardized schema for specification, capture, characterization, and communication of events of stateful properties that are observable in the operational domain.
Cyber Observable eXpression (CybOX)
An open framework for sharing threat intelligence in a machine-digestible format.
Open Indicators of Compromise (OpenIOC)
A language for the command and control of cyber-defense technologies. OpenC2 Forum was a community of cybersecurity stakeholders that was facilitated by the U.S. National Security Agency
Open Command and Control (OpenC2)
responsible for locating new files, disk space, or RAM to infect.
Search Routine
This portion of the virus is responsible for copying the virus and attaching it to a suitable host
Infection Routine
allow the attacker full control over the system. Poison Ivy is an example of this type of Trojan.
RAT
The idea behind this type of Trojan is to hide a user’s data.
Data Hiding
These Trojans (Zeus is one such example) intercept and use a victim’s banking information for financial gain. Usually, they function as a transaction authorization number (TAN) grabber, use HTML injection, or act as a form grabber. The sole purpose of these types of programs is financial gain.
E-banking
Types of Trojans
RAT
Data Hiding
E-Banking
DoS
Proxy
FTP
Security-Software Disablers
Trojan infection mechanisms
P2P
Instant Messaging
Internet Relay Chat
Email Attachments
Physical access
Browser
SMS messages
Impersonated mobile apps
Watering hole
Freeware
A Program used to cmbine two or more executables into a single packaged program
Wrapper
Compress files like programs such as WinZip, Rar, and Tar
Packers
software designed to install malware payloads on the victim’s system
Droppers
Function to encrypt of obscure the Code
Crypters
Ways to Distribute Malware
Wrapper
Packer
Dropper
Crypter
A tool that uses TCP ACK packets as a covert communication channel
AckCMD
Hackers can bypass SYN blocking rule by using what type of packet as a covert commuication channel
TCP ACK