Exam Study Material Flashcards
What is the cyber kill chain model?
The cyber kill chain model is a series of processes that show the various steps of a cyber attack. From the early stages of gathering information about potential victim to successfully having hands on keyboard extent control over the victim. The model helps us to determine and prevent against attacks
What are the 7 steps of the cyber kill chain model
Recconaissance Weaponisation Delivery Exploitation Installation Control and command Action on Objective
What is reconnaissance?
Selecting the victim, Information gathering, doing your homework on the victim, learning and analysing the network and systems and finding vulnerabilities and loopholes.
What is weaponisation?
Crafting the attack based on the loopholes and vulnerabilities discovered
What is delivery?
Delivering payload to the target via email, usb, phishing etc.
What is installation?
Installing malware on the targets system eg remote access trojan or backdoor loophole
What is exploitation?
Exploiting a vulnerability to execute the malicious code on the victims system
What is command and control?
Gives the attacker remote access to manipulate the victims system
What is action on objective?
The attacker has accomplished his goal and successfully carried out the attack to an extent he has so much control over the system that he’s basically got his “hands on keyboard” of the victim. He can now get collect, encrypt and disrupt services as he pleases.
What are the 5 pillars of information security?
C I A Authentication Non-repudiation
What is the Diamond Model Intrusion Analysis?
This model emphasises the relationships and characteristics of four basic components: the adversary, capabilities, infrastructure, and victims. The main axiom of this models states, “For every intrusion event, there exists an adversary taking a step toward an intended goal by using a capability over infrastructure against a victim to produce a result.”
What are the 4 components of the Diamond Model?
Adversary, Capability, Infrastructure and Victim
In regards to the diamond model, what is adversary?
This can be simply put as the person behind the malicious actions. Theres the adversary operator and adversary customer. The operator is the person carrying out the intrusion whereas the customer is someone who benefits from the intrusion.
In regards to the diamond model, what is capability?
Capability focuses on the describing and defining the tools and techniques employed by the adversary.
In regards to the diamond model, what is infrastructure?
Ip address, domain, email address, technology, product
type 1: infrastructure owned by intruder
type2: not owned, but used by intruder eg email account.