Exam Study Material Flashcards

1
Q

What is the cyber kill chain model?

A

The cyber kill chain model is a series of processes that show the various steps of a cyber attack. From the early stages of gathering information about potential victim to successfully having hands on keyboard extent control over the victim. The model helps us to determine and prevent against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 7 steps of the cyber kill chain model

A
Recconaissance
Weaponisation
Delivery
Exploitation
Installation
Control and command
Action on Objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is reconnaissance?

A

Selecting the victim, Information gathering, doing your homework on the victim, learning and analysing the network and systems and finding vulnerabilities and loopholes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is weaponisation?

A

Crafting the attack based on the loopholes and vulnerabilities discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is delivery?

A

Delivering payload to the target via email, usb, phishing etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is installation?

A

Installing malware on the targets system eg remote access trojan or backdoor loophole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is exploitation?

A

Exploiting a vulnerability to execute the malicious code on the victims system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is command and control?

A

Gives the attacker remote access to manipulate the victims system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is action on objective?

A

The attacker has accomplished his goal and successfully carried out the attack to an extent he has so much control over the system that he’s basically got his “hands on keyboard” of the victim. He can now get collect, encrypt and disrupt services as he pleases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 pillars of information security?

A
C
I
A
Authentication
Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Diamond Model Intrusion Analysis?

A

This model emphasises the relationships and characteristics of four basic components: the adversary, capabilities, infrastructure, and victims. The main axiom of this models states, “For every intrusion event, there exists an adversary taking a step toward an intended goal by using a capability over infrastructure against a victim to produce a result.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 4 components of the Diamond Model?

A

Adversary, Capability, Infrastructure and Victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In regards to the diamond model, what is adversary?

A

This can be simply put as the person behind the malicious actions. Theres the adversary operator and adversary customer. The operator is the person carrying out the intrusion whereas the customer is someone who benefits from the intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In regards to the diamond model, what is capability?

A

Capability focuses on the describing and defining the tools and techniques employed by the adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In regards to the diamond model, what is infrastructure?

A

Ip address, domain, email address, technology, product

type 1: infrastructure owned by intruder
type2: not owned, but used by intruder eg email account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In regards to the diamond model, what is victim?

A

it is the targets resources such as network, ip address, emails, social accounts etc that the adversary targets.

17
Q

What are the 6 meta features of the diamond model?

A
  1. Time stamp - each event is noted with its own date/time.
  2. Phase - malicious activity happens in a chain of events not a single event.
  3. Result - what was the result of the adversary’s operation. Did they succeed or fail and why and how.
  4. Direction - the direction of the events that occurred are important when considering the placement for detection when it comes to mitigation.
  5. Methodology - used to describe the general class of the activity eg. phising, port scan, syn flooding etc.
  6. Resources - one or more resources the event requires eg. software, hardware, funds.
18
Q

What is the CIA Triad?

A

Confidentiality - is all about making sure data/information stays private and only is accessed by an authorised person. It works on the basis of least privilege or need to know basis. The goal is to ensure people who don’t have access to classified information can not get their hands on this data/info, while the people who have the clearance for this can access it. An example of this is using user ID’s and passwords, ACL’s and policy based security

Integrity - Is making sure that data is not changed or altered all the while staying accurate and consistent. There are ways to ensure that data maintains its integrity, using things such as data encryption hashing algorithms etc.

Availability - Availability is the guarantee of reliable and constant access to your sensitive data by authorised people. Eg. having a disaster recovery plan or backup to ensure data isn’t lost and is available to authorised people.

19
Q

What are the Five Pillars of Information Assurance?

A

Confidentiality
Integrity
Availability

Authentication - is basically ensuring that something is legitimate or someone is really who they say they are. Eg, doing a 2 step verification to log into a social media account verifies its you. or even biometrics, passwords etc.

Non-Repudiation - is the assurance that someone cannot deny something. Eg when someone signs a contract or sends a message they cannot deny that it wasn’t them due to their signature or cannot say they didn’t send the message.

20
Q

What is penetration testing? its processes and two tools

A

pen testing is basically testing systems, networks and applications for vulnerabilites and loopholes that can be exploited.

The process involves gathering information, identifying vulnerabilities, attempting exploitation and reporting findings.

21
Q

Two penetration testing tools and what what they do?

A

Armitage - a tool from metasploit that scans and visualises the target and recommends a list of exploits that can be carried out.

Necromancer - its a vm that has a capture the flag environment used to analyse network traffic

22
Q

What is CVE and CVSS?

A

CVE is a list of common vulnerabilities and exposures and CVSS is common vulnerability scoring system which is a system that ranks security vulnerabilities based on their severity.

23
Q

What is CVSS composed off?

A

Its composed of three metrics

  1. Base - this is the characteristics of a vulnerability that are constant over time and user environment.
  2. Temporal - represents the characteristics of a vulnerability that change over time but not among user environment.
  3. Environmental - represents the characteristics of a vulnerability that
24
Q

Waht are the levels of severity and scaling?

A

Low severity - 0 - 3.9
medium severity - 3.9-6.9
high severity - 7.0 - 8.9
critical severity - 9.0-10

25
Q

What is NZISM?

A

New Zealand Information Security Manual is the nz governments manual on information assurance and information systems security. its based on risk management, governance, assurance and other technical standards.

26
Q

What is the ISO 27001?

A

The focus of ISO 27001 is the CIA of the information in a company.

27
Q

What is the NIST SP 800-53

A

NIST SP 800-53 is a guideline and standards document produced by NIST to help federal organisations comply with the Federal Information Security Management Act.