Data Security and Integrity Processes Flashcards

1
Q

Access Levels

A

allowing different users to have access to different data, such as giving some people Read Only access, or allowing some people to access more data than others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APT

A

Advanced Persistent Threat

a set of stealthy and continuous computer hacking processes, often orchestrated by humans targeting a specific entity, usually organisations and/or nations for business or political nations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT1

A

a professional cyber espionage group in China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT28

A

Fancybear

state sponsored malware attacks for information gathering for foreign governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT29

A

Hamertoss

a malware backdoor using Twitter and GitHub originating in Russia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adware

A

not dangerous in its own right, but may contains links to other malware, such as viruses and key loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack Vectors

A

describes direction of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoor

A

built into a computer program that allows someone to bypass any security to get to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Back-Up of Servers

A

this should be done off-site to avoid back-ups being destroyed in situations such as fires or floods that also destroy the originals, and the location should be on a need-to-know basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Baudot Code

A

a 5-digit binary number used in the Vernam cipher to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Behavioural Identifiers

A

consists of the exceptional ways in which individuals act, including identification of typing patterns, gait and other gestures; some of these behavioural identifiers can be utilised for constant validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bespoke Tools

A

specifically developed tools to target known vulnerabilities or poorly designed software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Biometric Exposures

A

high-tech cameras and other devices support usage of biometrics, but can also be used by attackers; people do not cover or hide their physical and behavioural features, therefore, attacks can happen by simply capturing biometric data from people without their permission or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometric Template

A

is compared to the data storage; data is encrypted for security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blagging

A

the act of convincing someone else to make them directly give away information such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bot Activity

A

software application that runs automated tasks on the Internet, usually with the intent to imitate human activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anonymisation Proxy

A

a tool that attempts to make activity on the Internet untraceable by acting as an intermediary and privacy shield between a client computer and the rest of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CAPTCHA Solving Zombie

A

bots that can solve CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cipher

A

message data after it has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Click Fraud Zombie

A

the practice of artificially inflating traffic statistics for online advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Closed Source Software

A

the collection and analysis of data gathered from closed sources to produce actionable intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Custom Written Software

A

software that is custom written for a specific job or company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cryptoanalysis

A

a method of trying to find the plain text from the cipher text without the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cryptography

A

the science of designing cipher systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DoS Extortion Zombie
a bot that carries out DoS
26
Spam Zombie
a bot that sends out spam
27
Botnet
where an entire network becomes infected with malware and are controlled as a group, eg to perform distributed DNS
28
Browser Script Attack
a type of injection attack in which malicious scripts are injected into otherwise benign and trusted websites
29
Brute Force Attack
where hacker have multiple guesses in quick succession at your password until they eventually guess it correctly
30
Caesar Cipher
a substitution cipher that involves substituting letters in a message for other letters, symbols and characters. It can be broken using brute-force attacks or letter frequency attacks, but it isn’t very secure as patterns in the text are still persevered, the most frequently used letters will appear in the same places as the plaintext’s most frequently used letters, the number of possible keys is too small and the same shift is likely to be used for each message
31
Cartesian Product
where the relationship between elements in two different sets are introduced
32
Check Digit
an extra digit or character added to the end of a long code. It is computed by applying an algorithm to the other digits. When the long code is entered, the check digit is calculated and compared to the check digit at the end of the code
33
Checksums
a simple error-detection scheme. Each transmitted package is accompanied by a numerical value based on the number of set bits in the message. The receiving station then applies the same formula to the message and checks to make sure the numerical value is the same. If not, the receiver can assume than an error has occurred and it will ask the sending computer to re-send the package
34
Commodity Tools
freely available tools and scripts on the internet including specialist toos for vulnerability scanning or penetration testing
35
Computer Misuse Act
legislation that protects personal data held by organisations from hackers, making unauthorised access to computers, unauthorised access to computer data and unauthorised modification of data illegal
36
Contingency Planning
planning for disaster
37
Cyberattack
attacks on computers or networks that use various types of malware
38
Survey
researching the target and reviewing available information to identify potential vulnerabilities and possible lines of attack
39
Delivery
crafting an attack to exploit a vulnerability and delivering it to the target
40
Breach
exploiting a vulnerability to gain access to information in order to create some negative impact
41
Attack
developing the attack to achieve the intention
42
Data Protection Act 2018
laws about personal data held by an organisation, stating that personal data must be kept up-to-date and accurate, not held for any longer than is necessary, that individuals relating to that information can access it and correct it and that they can receive compensation if the law is not followed regarding their data
43
First Data Protection Principle
processing of personal data for any of the law enforcement purposes must be lawful and fair
44
Second Data Protection Principle
the law enforcement purpose for which personal data is collected on any occasion must be specified, explicit and legitimate, and personal data so collected must not be processed in a manner that is incompatible with the purpose for which it was collected
45
Third Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and not excessive in relation to the purpose for which it is processed
46
Fourth Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and, where necessary, kept up to date, and every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the las enforcement purpose for which it is processed, is erased and rectified without delay
47
Fifth Data Protection Principle
personal data processed for any law enforcement purposes must be kept for no longer than is necessary for the purposes for which it is processed
48
Sixth Data Protection Principle
personal data processed for any of the law enforcement purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical and organisational measures
49
Decision Process
makes use of matching outputs
50
Decryption
the process of recovering original data, known as plaintext
51
DoS Attack
Denial of Service Attack attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests, usually in an attempt to exhaust server resources
52
Dictionary Attack
where the hacker use a file containing every word in the dictionary to guess your password
53
Disaster Recovery
plans to recovery after disaster
54
Disposal of Files
allows better file integrity
55
Distributed DoS
DoS involving may networks, possibly because several networks are all attacking at once, or because several networks are all being attacked at once
56
Driving Table
the most important table in SQL
57
Eavesdropping
where hackers attempt to intercept keys in order to decode encrypted messages
58
Email Attacks
cyber attacks done through e-mail * Access to Corporate Email * Harvesting Associating Accounts * Harvesting Email Contacts * Stranded Abroad Advance Scams * Webmail Scam
59
Encryption
the process that transforms data into something that appears random or otherwise obscures the meaning of the data
60
Enrollment
the process by which a reader or scanning device is used to record the biometric factor being authenticated
61
Equation Group
one of the most sophisticated cyber-attack groups in the world
62
External Code Blue
a cyber-attack feature that attacks SMB
63
Fallback Process
if biometric identification fails
64
Firewall
monitoring packets against attempts to exploit weaknesses in the TCP/IP protocol suite which worms and trojans can exploit
65
GDPR
General Data Protection Regulation EU framework for data protection laws, came into force on 25th May 2018,
66
Guess Attack
where the hacker uses a file containing every word in the dictionary to guess your password
67
Hacktivists
people who believe they are hacking for the greater good
68
Hostage Attack
involves holding a company or person hostage * Fake Antivirus * Ransomware * Email Account Ransom * Webcam Image Extraction
69
Hallucination
where AI presents lies as fact
70
ICO
Information Commissioner’s Office responsible for enforcing GDPR and Data Protection Act
71
Injection Attack
an attacker tries to get the program to execute their malicious code by including it as a regular output, which can be avoided by using input validation
72
Input Sanitisation
a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and strings to prevent the injection of harmful codes into the system
73
Insider Threat Exploitation
coercion, bribery, political persuasion
74
Internet of Things
things that wouldn’t traditionally connect to the internet such as Smart thermometers in fish tanks and Ring doorbells
75
IP Address Spoofing
involves an attacker changing the IP address of a legitimate host so that a visitor who types in the URL of a legitimate site is taken to a fraudulent or spoofed web page, meaning the attacker can use this page to steal sensitive data or install malware
76
Key Logger
a type of software that can be used to track keystrokes and capture passwords, account numbers, fraudulent use or people’s online activity
77
Key Stream
the message created by the Vernam cipher
78
Killdisc
the only way to permanently destroy data by repeatedly writing 0s over the data, but it is very obvious if a disc has been killed because there will be more 0s than a brand new disc
79
Letter Frequency Attack
where the cipher is decrypted looking at how frequently different letters appear
80
LOIC
Low Orbit Ion Cannon software used in Denial of Service attacks
81
Malware
any malicious software
82
Miner
a form of malware that uses the resources of an infected device to generate units of cryptocurrency
83
MitM Attack
Man in the Middle Attack occurs when someone sits between two computers and intercepts traffic
84
Name Generator Attack
attacks in which the victim is asked to put in personal data, often to produce a name, allowing attackers to find information for security questions
85
Neural Network
a computer system modelled on the human brain and nervous system
86
One-Time Pad
invented by Claude Shannon in 1949, where plaintext of a message is mixed with random text taken from a one-time pad resulting in a ciphertext which is truly random. The same one-time pad is used to unmix the random text from the cipher text, which results in the original plaintext. Pads can only be used once, hence the name. The red phone used in the 1980s for secure communication between the USA and the USSR was based on this
87
Open Source Intelligence
the collection and analysis of data gathered from open sources to produce actionable intelligence
88
Oracle Database
an object relational database management system
89
Outerjoin
a SQL command that joins columns from one or more tables into one table
90
Parity Checking
either a 0 or a 1 will be added to the end of a string of binary code to indicate whether it is odd or even. The receiving host will know whether the parity bit is 1 or 0 so will know that the correct amount of bytes has been transmitted
91
Even Parity
where the parity bit is set to 1 if the number of bits is odd so the extra parity bit will make the number of 1s even
92
Odd Parity
where the parity bit is set to 1 if the number of bits is even so the extra parity bit will make the number of 1s odd
93
Password Attacks
any attacks that involve guessing passwords, such as guess attacks and brute force attacks
94
Password Policies
the rules that state you must have a certain amount of capital letters, numbers and special characters in your passwords
95
Port Scanner
an application designed to probe a server or host for open ports
96
Pharming
where users are unknowingly redirected to a fake website with the intention of identity or information theft
97
Phishing
emails sent to large numbers of people asking for sensitive information or encouraging them to visit a fake website
98
Physiological Identifiers
associated with the structure of the user is confirmed and include facial recognition, fingerprints, finger geometry, iris recognition, vein recognition, retina scanning, voice recognition and DNA matching
99
Plaintext
original data that gets encrypted
100
Polyalphabetic Cipher
a cipher involving multiple alphabets, eg Vigenère cipher
101
Port Scanner
an application designed to probe a server or host for open ports
102
Pretexting
attack in which the perpetrator invents a scenario to convince the victim to give them data or money, often requiring the attacker to maintain conversation with the victim until they are persuaded to give money or information
103
Pseudorandom
the idea that computer algorithms can never be truly random because they are generated deterministically
104
Read/Write Permissions
limit the amount of people who can access or edit a file
105
Reader
a device used to record a biometric factor
106
Redundant Servers
active them if the original servers fail; these should be kept off-site and offline to ensure they are not compromised
107
Relocating Key Personnel
in a disaster, key personnel should go to a new site and maintain it
108
Root Kit
a type of malware that enables cyber criminals to gain access to and infiltrate data without being detected
109
Sandbox
an isolated environment for testing code on an isolated network that mimics end-user environments
110
Scanning
attacking wide swathes of the internet at random
111
Scanning Device
a device used to record biometric data
112
Sensor
grabs data and translates it into a usable digital format via software
113
Shadow Brokers
branch of the FSB that do cyber attacks
114
Shouldering
involves watching a user input passwords, for example, over their shoulder at PIN machines, but also by binoculars or CCTV
115
Social Engineering
research on a person or organisation to gain information for an attack
116
Spear Phishing
sending e-mails to targeted individuals
117
Spyware
installed by opening attachments or downloading infected software, used to collect stored data without the user’s knowledge
118
SQL Injection
a technique where users can inject SQL commands into statements via webpage input, which can alter SQL statements and compromise the security of information held in a database
119
Subverting the Supply Chain
attack information, equipment or software used to support the organisaiton
120
Theft
taking laptops, tablets or smartphones
121
Traffic Analysis and Interception
122
Trojan Horse
where malware is hidden with a program that appears to be useful
123
Backdoor Trojans
enables remote control over the infected computer by a cyber criminal or hacker to do anything they wish on the infected computer
124
Dropper
a form of trojan that facilitates delivery and installation of malware
125
Trojan-Banker
programs designed to steal account data for online banking systems, e-payment systems and credit or debit cards from infected computers
126
Trojan-DDoS
conducts designated Denial of Service attacks against a targeted web address
127
Trojan-Downloaders
can download and install new versions of malicious programs onto your computer, including Trojans and adware
128
Trojan-Mailfinders
can harvest e-mail addresses from a computer
129
Trojan-Ransom
can modify data on your computer so that your computer doesn’t run correctly or you can no longer use specific
130
Turing Test
tests how intelligent a computer is based on whether you could interact with it and not know you were talking to a machine
131
Twofish Cypher
a cypher that relies on cyclic shifts
132
Vernam Cipher
invented in 1917 by Gilbert Sandford Vernam, it mixes each letter in a message with a letter from a completely randomly chosen string called a key stream. Letters are translated into 5-digit binary numbers known as Baudot Code then a random string that is longer than or equal in length to the message created known as a key stream. Each binary digit can be combined with a binary digit from the key stream using an XOR operation, and to decrypt it, the ciphertext is XORed with the key stream again, then the Baudot code is decoded
133
Vigenère Cipher
for the cipher, the plaintext and cipher must be the same length; using a Vigenère square, the plaintext is encrypted
134
Virus
programs that spread from one system to another by attaching themselves to host files, used to modify or corrupt information on a targeted computer system
135
Web Server Attacks
can either target the application itself in order to get access to sensitive data, or they can use the application as a staging area for attacks against the program’s users * Child Pornography Server * Malware Download Site * Phishing Site * Piracy Server * Spam Site * Warez Server
136
Whale Phishing
a form of spear phishing targeting the boss
137
Worm
self-replicating programs that identify vulnerabilities in operating systems and enable remote control of infected computers
138
Zombie
a computer that has been taken over and is being used by a hacker
139
Zombie Cookie
a form of cookie that recreates itself after being deleted from the computer