Domain 2 Flashcards

1
Q

Nation State

A

Country’s Government that uses cyber attacks to disrupt or steal information from another country. High Skill. Motivation Espionage, Disruption, Power. Example - Stealing intellectual property from a foreign competitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unskilled Attacker

A

Someone with limited technical knowledge who may launch attacks out of curiosity or malice. Low. Malice, Curiosity. Launching a phishing campaign against random email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

To promote a political or social cause. Varies skill. Values (Political/Social). Example leaking sensitive data from a corporation they believe is unethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider Threat

A

Authorised Internal user who intentionally or unintentionally misuses their access to harm a system or organisation. Varies (Financial Gain, Espionage, Disgruntled employee). Selling customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organised Crime

A

A criminal syndicate that uses cyberattacks for financial gain, such as stealing money or data. High Sill. Financial Gain (Extortion or Fraud). Example Ransomware attack on a major hospital chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shadow IT

A

Employees leveraging unauthorised or unmanaged IT resources used within an organisation, which can create security vulnerabilities. Varies. Productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Exfiltration’s

A

Unauthorised removal of sensitive or proprietary information from computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Espionage

A

Goal of stealing confidential information from another organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service Disrption

A

Causing Outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blackmail

A

Threat to expose sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Financial Gain

A

Steal money or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Political belief

A

Driven by ideological or political motivations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethical Hacking

A

Authorised Stimulated attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Revenge

A

Retaliate against previous activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disruption/Chaos

A

Aimed at causing widespread disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War

A

Disrupt Enemy military operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat Vector

A

Method or Combination of methods that attacker use to gain unauthorised access to a computer system, network or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attack Surface

A

Sum total of all the possible entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authority

A

Citing Position, Responsibility or affiliation that grants the attacker the authority to make the request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intimidation

A

Suggesting you may face negative outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consensus

A

Claiming that someone is in a similar position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Famililarity

A

Attempting personal connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trust

A

Citing Knowledge and experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Urgency

A

Time sensitivity that demands immediate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Spear Phishing

A

Targets Specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Whaling

A

Targets high level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Vishing

A

Voice based Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Smishing

A

SMS based messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Pretexting

A

Attacker tries to convince a victim to give up information of value, or access to a service or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Watering Hole

A

Attackers compromise a legitimate website frequently visited by a target grou

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Brand Impersonation

A

Attacker creates websites, social media accounts, or email that closely resemble those of a legitimate brand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Typosquatting

A

Typing incorrect website address. URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Vulnerability

A

Weakness in system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Threat

A

Potential event that could exploit the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Exploit

A

Specific Method/tool used to take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Attack

A

Actual attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Buffer Overflow

A

Exist when a developer writes code that does not validate user input to ensure it does not allow input that is too large. Prevent this with Input Validation and Prevent this by software training.

38
Q

Memory Injection

A

Maliciously inserting information into memory is known as memory injection. This is primary goal of buffer overflow

39
Q

Integer Overflow

A

Putting too much information into small space

40
Q

Race Condition

A

Systems behaviour is based on sequence or timing of uncontrollable events

41
Q

Time of Check

A

Moment a system verifies access permission or other security controls

42
Q

Time of Use

A

Moment when the system accesses the resources or uses granted permission

43
Q

SQL Injection

A

Use unexpected input to a web application to gain unauthorised access to an uderlying database

44
Q

Cross Site Scripting

A

Malicious scripts are injected into otherwise benign and trusted websites through input field

45
Q

Firmware

A

Firmware attacks can occur through the update process or one of malicious downloads, impacting the boot process

46
Q

End of life

A

Aging equipment that has some usable lifespan left

47
Q

Legacy

A

Hardware, Software that are unsupported

48
Q

Server Virtualisation

A

Is the process of dividing a physical server into multiple unique and isolated virtual servers by means of software applications (hypervisor)

49
Q

Resource Reuse

A

When cloud providers take hardware resources originally assigned to one customer and reuse them with another customer

50
Q

Rooting and Jailbreaking

A

Remove the vendor restrictions on a mobile device

51
Q

Zero day

A

Attack that uses a vulnerability that is either unknown to everyone

52
Q

Trojan

A

A software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network

53
Q

Spyware

A

Software designed to monitor and steal a users activity without their knowledge

54
Q

Worm

A

Self replicating program that spreads itself across network, infecting other computers

55
Q

Bloatware

A

Unnecessary software pre-installed on a device

56
Q

Keylogger

A

Software or hardware that records every keystroke typed on a computer

57
Q

Multipartite virus

A

Use more than one propagation technique

58
Q

Stealth Viruses

A

Hide themselves by actually tampering

59
Q

Polymorphic Viruses

A

Modify their own code as they travel

60
Q

Logic Bomb

A

Malicious code designed to trigger a specific action at a predetermined time or even

61
Q

Rootkit

A

Provides attacker Privileged Access

62
Q

Denial of Service

A

Is a resource consumption attack intended to prevent legitimate activity on a victimised system

63
Q

DDOS

A

DOS attack multiple compromised computers

64
Q

Reflected DDOS

A

Attacker sending request to third party server with a spoofed source IP address

65
Q

Amplified DDOS

A

Reflection techniques in combination with amplification

66
Q

DNS Poisoning

A

Attacker alters the domain name to IP address mappings in DNS system. May direct traffic to a rogue system or perform Denial of service

67
Q

DNS Spoofing

A

Attacker sends false replies to a requesting system beating real repy from valid DNS server

68
Q

Domain Hijacking

A

Change the registration of a domain through technical means

69
Q

Bluejacking

A

Push unsolicited message

70
Q

Bluesnarfing

A

Data theft using Bluetooth

71
Q

Blue bugging

A

Backdoor attack before returning control of the phone to its owner

72
Q

Evil Twin

A

Malicious Access point set up to appear to be legitimate trusted network

73
Q

Rogue Access Points

A

Access Points added to your network either intentionally or unintentionally.

74
Q

On Path attack (Man in the Middle Attack)

A

Attacker between 2 endpoints and is able to intercept traffic

75
Q

Credential Replay

A

Stealing or Capturing legitimate login credentials

76
Q

Directory Traversal

A

Gain access to restricted directories . Command Injection attack is used to carry Directory traversal

77
Q

Collision Attack

A

Two inputs that produce the same hash value. MD5 is known for collision

78
Q

Downgrade Attack

A

Protocol that is downgraded from higher mode to lower mode

79
Q

Birthday attack

A

Attempt to find collision in hash function. Targets Digital Signature

80
Q

Password Spraying

A

Single password for many different accounts

81
Q

Mobile App Management (MAM

A

keep personal and business data separate

82
Q

Mandatory Access Control

A

Determined by the system and not the object owner

83
Q

Discretionary Access Control

A

Permits the owner or creator of an object to control and define accessibility. NTFS file permission

84
Q

Non discretionary access control

A

Enables the enforcement of system wide restrictions that override object specific access control

85
Q

Rule based Access control

A

Rules define the traffic

86
Q

Role Based Access control

A

Well defined collection of name job control

87
Q

Application Allow lst

A

Explicitly allowed application

88
Q

Application Deny

A

Not restricted will be allowed

89
Q

Hardware Root of Trust

A

A line of defence against executing unauthorised firmware. It verifies keys match before the secure boot process

90
Q

Trusted Platform Module

A

Chip on the motherhood. Multipurpose for securing keys and FDE

91
Q

Extended Detection and Response

A

Includes Network devices, cloud infrastructure, IoT devices

92
Q

HIPS - Host based intrusion prevention system

A