CySA+ Study Notes 2 Flashcards

1
Q

Spoofing, Tampering (gain unauthorized access etc), Repudiation (attempt to deny responsibility of attack even blame 3rd party), Info Disclosure (steal confidential info and sell to unauthorized person(s)), Denial of Service, Elevation of Privileges.

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

breaks down system into smaller components then analyzes those components.

A

Reduction Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

??? all of the systems and services that could present potential points of entry for an entry.

??? means used by attacker to gain initial access to system or network.

??? Adversary capability, total attack surface, attack vector, impact, likelihood.

??? organized systematic approach to seeking out IOC’s on networks using expertise and analytic techniques.

A

Total Attack Surface / Attack Vector / Threat Modeling Factors / Threat Hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat hunting 1st est. hypothesis, then think of IOC’s like unusual binary files, unexpected process, unexplained log entries, etc … then once we find these we move into incident response process …

??? Adversarial, Tactics, Techniques, &, Common, Knowledge

A

info / MITRE ATT&CK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

??? 1) Adversary : person or group trying to compromise info or info systems could be external or internal threat. (2) Victim : entity targeted by attack, might be broad org. or a specific system. The adversary has (3) Capabilities to engage in a attack injection of SQL code is an example of capability. (4) Infrastructure : physical and logical resources that attacker has available to wage attack, infrastructure might include IP address, email addresses, etc anything that can be used by attacker.

A

Diamond Model of Intrusion Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? (1) Timestamp, (2) Direction (tells us how the attack took place), (3) Phase, (4) Result (was attack successful? ) If attacker triggers an event in their own infrastructure that targets the victim, the “direction” is Infrastructure-to-victim. (5) Methodology corresponds to attack vector, and (6) Resources include the info, software, hardware, funds, facilities, and access needed to carry out an attack.

A

Diamond Model Meta Features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? focuses on activities of APTs, 1st Step : of attack is engage in recon, 2nd Stage : weaponization, create a weapon to target specific vulnerability in the victims environment. 3rd Stage : Delivery, deliver through some attack vector like email, an infected website, or infected storage media. 4th Stage : Exploitation, exploiting vulnerability to execute code on victims system, 5th Stage : Installation, installing malware on the asset, 6th Stage : Command and Control (C2), 7th Stage : Actions on Objectives, has actual access …

A

Cyber Kill Chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(UserMode) : run w/normal user privileges, easy to write / difficult to detect; KernelMode : run w/system privileges, difficult to write / easy to detect.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

writing virus in obfuscated assembly language, blocking use of system debuggers, preventing use of sandboxing.

A

Armored Virus Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authority and Trust (people defer to authority), Intimidation (scaring people), Consensus/Social Proof (herd mentality), Scarcity (making people believe if they dont get the last one they will miss out), Urgency (pressured to act quickly because they are told time is running out), Familiarity/Liking (people want to say yes to someone they like).

A

Social Engineering Tactics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly