Domaine 2 : Menaces, vulnérabilités et atténuations Flashcards

1
Q

What are Script Kiddies?

A

Inexperienced individuals using existing tools to exploit vulnerabilities without understanding the underlying systems.

Script Kiddies often rely on user-friendly hacking tools created by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary motivation of Hacktivists?

A

Promoting political agendas through unauthorized access or disruption of systems.

Hacktivism often involves activism or protest against perceived injustices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What distinguishes Organized Crime in the context of cyber threats?

A

Groups engaging in cybercrime for financial gain, often employing sophisticated techniques.

Organized Crime can include activities like identity theft, credit card fraud, and ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are Nation-State Actors?

A

Government-sponsored entities conducting cyber-espionage or cyber-attacks to achieve national objectives.

Nation-State Actors often target critical infrastructure and sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What role do Insiders play in cybersecurity threats?

A

Employees or associates with authorized access who intentionally or unintentionally compromise security.

Insider threats can be particularly challenging to detect and mitigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can Competitors exploit cyber vulnerabilities?

A

By seeking to gain an advantage through unauthorized access to proprietary information.

This can include industrial espionage and data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the motivation of a threat actor indicate?

A

Understanding the intent behind an attack helps in anticipating and mitigating threats.

Motivations can range from financial gain to ideology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are resources important in assessing threat actors?

A

The level of funding and tools available to the threat actor influences the sophistication of attacks.

More resources can lead to more advanced and damaging cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do capabilities refer to in the context of threat actors?

A

Technical skills and knowledge determine the potential impact of the threat actor.

Capabilities can include programming skills, access to hacking tools, and experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does intent clarify regarding threat actors?

A

Whether the actor aims to disrupt, steal, or damage assets.

Understanding intent can help organizations tailor their defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by opportunity in assessing threat actors?

A

Access to systems or vulnerabilities that can be exploited.

Opportunity can arise from poor security practices or unpatched software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should organizations assess potential threat actors?

A

By analyzing their motivations, resources, capabilities, intent, and opportunity.

This assessment helps in prioritizing and implementing effective security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common messaging systems exploited by attackers?

A

Email, SMS, and instant messaging

Attackers use these systems to deliver malicious links or attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What techniques do attackers use in messaging systems?

A

Phishing, smishing, vishing

Phishing is via email, smishing via SMS, and vishing via voice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of files can contain embedded malware?

A

PDFs, documents, spreadsheets, executables

These file types often use macros and scripts to initiate attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a common method for initiating attacks in files?

A

Macros and scripts

These can be embedded within various file formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can images pose a threat?

A

Images, particularly SVG files, can include malicious code

This code executes when the image is viewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What risk do USB drives pose in terms of malware?

A

USB drives can introduce malware, especially as HIDs

Configured as keyboards, they can automate malicious actions.

19
Q

What are air-gapped systems vulnerable to?

A

Physical security compromise

If physical access is gained, air-gapped systems can be infected.

20
Q

What is a common issue with default credentials?

A

Many systems are deployed with default usernames and passwords

These can be easily exploited by attackers.

21
Q

What do misconfigured services and open ports provide?

A

Avenues for unauthorized access

Misconfigurations can lead to security vulnerabilities.

22
Q

How can supply chain vulnerabilities be exploited?

A

Compromising third-party software or hardware components

Trusting unverified sources can lead to widespread vulnerabilities.

23
Q

What is the risk of unpatched software?

A

May contain known vulnerabilities

Regular updates and patch management are crucial for security.

24
Q

What can open or poorly secured network ports lead to?

A

Unauthorized access

Proper firewall configurations and network segmentation help mitigate these risks.

25
Fill in the blank: Attackers exploit _______ to deliver malicious links or attachments.
messaging systems
26
True or False: All USB drives are safe from malware.
False ## Footnote USB drives can introduce malware, especially when misconfigured.
27
What are some examples of techniques used by attackers in messaging?
* Phishing * Smishing * Vishing ## Footnote Each technique targets different communication methods.
28
What is the purpose of patch management?
Regularly update systems and applications to fix known vulnerabilities ## Footnote It is crucial for maintaining the security and functionality of software.
29
What should be implemented to ensure timely updates in patch management?
Automated patching processes ## Footnote Automation helps reduce the risk of human error and delays.
30
What is the role of encryption in data protection?
Protect data at rest and in transit ## Footnote Encryption secures sensitive information from unauthorized access.
31
What should be employed to safeguard sensitive information?
Strong encryption protocols ## Footnote Using robust encryption algorithms is essential for security.
32
What is the importance of monitoring and logging in security?
Continuously monitor systems for unusual activities or potential threats ## Footnote This helps in early detection of security incidents.
33
What should be maintained to assist in incident detection and response?
Comprehensive logs ## Footnote Logs provide critical information during investigations.
34
What does the least privilege principle entail?
Grant users only the access necessary to perform their job functions ## Footnote This minimizes the risk of misuse of privileges.
35
Why is it essential to regularly review and adjust permissions?
To minimize potential abuse ## Footnote Regular reviews help ensure that only necessary access is granted.
36
What is network segmentation?
Divide networks into segments to contain potential breaches ## Footnote Segmentation limits the spread of attacks within a network.
37
What should be implemented between network segments to enhance security?
Firewalls and access controls ## Footnote These tools help regulate traffic and protect sensitive areas of the network.
38
What is the goal of security awareness training?
Educate employees about common threats like phishing and social engineering ## Footnote Training reduces the likelihood of successful attacks exploiting human vulnerabilities.
39
What is important for promoting a culture of security awareness?
Reducing human-related vulnerabilities ## Footnote A security-aware culture encourages proactive behavior among employees.
40
What should be developed and regularly updated as part of incident response?
An incident response plan ## Footnote This ensures organizations are prepared for various security incidents.
41
What is the purpose of conducting drills in incident response planning?
Ensure preparedness for potential security incidents ## Footnote Drills help identify weaknesses in the response plan.
42
What is the importance of implementing regular backup procedures?
Protect against data loss ## Footnote Regular backups are essential for data integrity and recovery.
43
What should be tested to ensure data can be restored effectively?
Recovery processes ## Footnote Testing recovery ensures that backups are functional and reliable.