Domain 2 Security Flashcards
Wireless Encryption
data is being sent over the air and anyone can listen
Encryption makes the signal impossible to understand without the key
WEP
Wired equivalent privacy
vulnerabilities / Do not use
often uses a hexadecimal key for authentication
WPA
short term solution for WEP
its legacy/ do not use
uses TKIP
WPA2
uses CCMP block cipher mode / Counter Mode and Cipher Block Chaining
data confidentiality with AES encryption
WPA2- Personal / pre-shared key
WPA2 - Enterprise / authentication server, no shared key
WPA3
uses GCMP block cipher mode / Galois/Counter Mode Protocol
stronger than WPA2, fixes WPA2 PSK has issue
Authentication
Radius : remote authentication dial-in user service, talk to VPNS
TACAS+ : terminal access control access control system
Connect to network equipment, usually a Cisco device
Kerberos : usually a Microsoft network, supports SSO when logging into a domain
Authentication
single-factor = password
Multifactor = password and certificate or captive portal
Malware
any software initially designed to cause disruption to computer server without the user’s knowledge or consent
Virus
code that runs on a computer without the user’s knowledge
typically attached to an executable which allows it to replicate
spread using email, websites, and/or network file sharing
Worm
similar to a virus but it will self replicates
exploits network vulnerabilities to spread and infect more hosts
spread through emails, websites, and network shares
doesn’t need human interaction
Ransomware
restricts the use of a computer until the user pays a ransom, often encrypts the data and holds the key to unlock it ransom
Trojan
appears to perform a desired function, but actually does something malicious
used to deliver other malware
Spyware
software used to spy on the user
can be difficult to detect
examples include keyloggers, rootkits, system monitors, and tracking cookies
can be used with adware
Keylogger
form of spyware
used to record keystrokes, personal info/passwords
info can be sent over network or stored locally for later pickup
Rootkit
designed to hide and give attackers access to the computer
often used to hide other types of malware or provide ongoing access
difficult to detect with traditional malware scanners
Botnet
network of infected devices
usually not easy to tell if you are infected
bot software waits for instructions from a controlling device
often used to perform DDoS attacks
Boot Sector Virus
will infect the system boot partition or the master boot record
a type of malware that runs as soon as your OS is booted, not after, therefore making it harder for anti-malware to prevent
secure boot, which is included in UEFI BIOS, should prevent unsigned software
Cryptominers
malware that unknowingly uses your computer, to complete tasks that earn the hacker cryptocurrency
mining cryptocurrency uses a lot of CPU resources, and attackers typically try to gain access to multiple CPUs
a spoke in your CPU utilization could be a warning sign
Windows Recovery ENvironment
windows recovery environment gives you complete control of your system before it even starts
be careful to know what you’re doing; the environment contains all the files related to your OS
can remove malicious software before it boots up
can repair the file system boot sector or master boot record
Removal Methods
antivirus/antimalware
software usually quarantines files before removal , make sure its updated, make sure its running in real time
Completely reinstall the OS
Restore from backup, make sure it’s a clean backup
manually install the OS, make sure you have your data backed up first
An ounce of Prevention
End user education, don’t go to sketchy websites, don’t plug in flash drives you found on the street, identify spam/ malicious messages, anti-phishing training
Software firewalls
Windows firewall is built into the Windows OS and enabled by default
macOS/Linux may have packages installed but not enabled
Social Engineering
tricking users into giving out confidential information or performing other actions such as downloading malware
Phishing
used to try to hook users often through links in email or websites
Spear Phishing (phishing)
targets a specific individual or institution
Whaling (phishing)
targets someone at a high level such as a CEO
Vishing Attack
like phishing but it is done over the phone or voicemail
trusted companies will not ask for sensitive information in email or phone calls
Shoulder surfing
attacker looks over the shoulder of a user to obtain information
Can be done with phone cameras as well, use a privacy screen, never leave password/PIN info visible, lock or log off computers when not using them
Tailgating
attacker follows closely behind an authorized user into a secure area
turnstiles and access control vestibules are effective measures to prevent this
Impersonation
attacker pretends to be an authorized employee
convince user to give up info or perform a task
Dumpster diving
Attacker looks through the trash/recycling for sensitive information
Evil Twin
wireless form of a phishing attack
attacker will create a wireless access point with the same or similar SSID of an existing network
always use HTTPS and a VPN to protect yourself
Denial of Service (DoS) attacks
attacker overloads target with information causing it to fail
Distributed DoS (DDoS) uses an army of devices to perform DoS attack
devices in a botnet may be
referred to as zombies
Zero-Day Exploits
many applications have vulnerabilities that jsut haven’t been found yet
ethical hackers find exploits and report them to companies
an attack using a previously unknown exploit is called a zero-day attack
Spoofing
pretending you are something/someone you aren’t
Email address, MAC address, DNS servers
On-Path Attack
traffic is redirected through a middleman device
you may have no idea information is being siphoned
use encrypted protocols to protect against this
Password Attacks
most password attacks don’t happen at the login page
attackers gain access to the password file or database
contains passwords in a hashed format-not clear text
attackers then created hased versions of password guesses, then compare them to the database
Brute force attack ( password attack)
attackers attempt every combination of viable characters, takes a long time, often not viable
Dictionary attack ( password attack)
attackers use a list of common words
Rainbow table attack ( password attacks)
attackers use an optimized list of pre-hashed values
significantly faster compared to other attacks
not viable if has is salted random values are added
Insider Threat
Former and current employees have institutional knowledge that is valuable to attackers
- attacks can get a better idea of
when, where, and how to attack - this can earn the insider a lof
money
some attackers try to get hired by the company they intend to attack, thus giving them even more access
SQL Injection
Websites typically have a database to store information related to the site
- SQL (Structured Query Language)
is a programming language used
to talk to the database
AN improperly formatted website could allow an attacker to manipulate the SQL code and find information they shouldn’t have access to e.g. personal employee data
Cross-site Scripting (XSS)
an attack where information from one site is shared with the attackers
there is a common web application development error that allows malware to take advantage of JavaScript
keep your browser up to date and don’t click on any untrusted links
Input validations - make it so that users can’t put scripts into an input field
Non-Compliant Systems
systems who don’t comply with the Standard Operating Environment (SOE), are a major security concern for your network
Make sure devices are installing new OS updates, security patches, and anti-virus signatures
- non-compliant systes will warm
the users, and potentially lose
access to the network
Unpatched Systems
windows release patches on the second Tuesday of every month
any device that is not patched is the weakest link on your network and that’s the device that attackers will target
Unprotected Systems
sometimes during troubleshooting, it might be necessary to disable some of your security features
- disabling the firewall
- disabling the antivirus
be sure to tur these on once you are done. never permanently disable security features
EOL OSs
End of Life (EOL)
Manufacturer stops selling an OS, they might continue supporting the OS and release important security patches and updates
End of Service Life ( EOSL)
Manufacture stops selling and stops supporting the OS
No more security patches and updates
At this point, you need to find an alternative solution