Dion Cards Flashcards

1
Q

What is the AAA of Security?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Authentication in the AAA of Security?

A

When a person’s identity is established with proof or by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 ways Authentication can be established?

A
Something you are
Something you know
Something you have
Something you do
Somewhere you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Authorization in the AAA of Security?

A

Its when a user is given access to something - e.g. data or area of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Accounting in the AAA of Security?

A

The tracking of data, computer usage and network resources.

Non-repudiation occurs when you have proof someone did an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 main types of security threat?

A

Malware
Unauthorized Access
System Failure
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Unauthorized Access threat?

A

Happens when someone accesses data/resources without the owner’s consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is System Failure as a threat?

A

Happens when a computer or application fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the threat of Social Engineering?

A

Manipulation of users to give up confidential info or to perform detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three types of controls/categories that can mitigate threats?

A

Physical Controls
Technical Controls
Administrative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give some examples of Physical Controls (6)

A
Fence
Locked doors
Alarm systems
Surveillance cameras
ID Cards
Security Guards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give some examples of Technical Controls (5)

A
Smart cards
Encryption
ACLs (Access Control Lists)
Intrusion Detection Systems
Network Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give some examples of Administrative Controls (5)

A
Policies
Procedures
Security Awareness Training
Contingency Planning
Disaster Recovery Planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 types of hacker!?

A

White Hat
non malicious, has company permission

Black Hat
malicious, no permission

Gray Hat
no company affliction, no permission. Trying to shame/educate, not personal gain

Blue Hat - has permission from company, but not employed by company

Elite - exploit things first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Advanced Persistent Threat?

A

Highly trained and funded groups of hackers e.g. Nation states

17
Q

What is a Virus?

A

Viruses require user action in order to reproduce and spread

18
Q

What are the 9 types of virus?

A
  1. Boot Sector
  2. Macro
  3. Program
  4. Multipartite
  5. Encrypted
  6. Polymorphic
  7. Metamorphic
  8. Stealth
  9. Armored
  10. Hoax
19
Q

What is a Multipartite Virus?

A

A virus that combines boot and program viruses that first attacks the boot sector and system files.

20
Q

What is a Macro virus?

A

A virus that is embedded into a document and is executed when the document is opened

21
Q

What is a polymorphic virus?

A

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection.

22
Q

What is a metamorphic virus?

A

A virus that rewrites itself entirely, before it attempts to infect a file.

23
Q

What is an Armored virus?

A

A virus with a layer of protection to confuse a program or person analyzing it

24
Q

What is a worm?

A

Like a virus, but can replicate on its own, without user interaction.

25
Q

What is a RAT?

A

Remote Access Trojan. The most common form of trojan horse - provides the hacker with remote control of a victim’s computer

26
Q

What is greyware?

A

Software that isn’t benign or malicious, just behaves improperly without serious consequences.

27
Q

What is a DLL injection?

A

DLL Injection is commonly used by rootkits to maintain their persistent control. The malicious code is inserted into a running process on a Windows machine via Dynamic Link Libraries that a loaded at runtime.

28
Q

What is Drive Manipulation?

A

Compromises the kernel-mode device drivers at privilege/system level. A shim is placed in between to intercepts calls.

29
Q

What is a watering hole?

A

Malware that is placed somewhere you know your users will go -
:) www.wynspeare.com
:( www.winspeare.com

30
Q

What is C2?

A

Command and Control - used with botnets

31
Q

What is active interception?

A

Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.