GENERAL CYSA TEST Flashcards
What is a Technical or Logical Control?
Type of Security Control- In a system e.g by hardware, software, firmware
What is an Operational Control?
Type of Security Control- Implimented by people
What is Managerial Controls?
Security Control Provides oversight of a information system
What is a preventative control?
Control that acts to elininmate or reduce likelihood that an attack can success
What is a detective control?
Control that may not prevent or deter access but will identify and record an attempted intrusion
What is a corrective control?
As Acts to elinate or reduce the impact of intrusion event
What is Security Intelligence?
Collecting data from live systems and analyising it to show the security status of said system
What is Cyber Threat intelligence?
Proactive approach to researching emerging threats and their sources to keep an up to date image of the wider threat landscape
What is open source intelligence?
The process of obtaining information using public records, websites and social media
What is EPP and what does it do?
Endpoint Protection Platform- Swiss army knife of protection, can include AV, HIDS/HIPS/ Encryption DLP and lots more all under one tool (Mostly based on signature detection)
What is EDR and what how does it differ from EPP?
Endpoint Detection & Response- Another prorgam that includes many different security tools inside it. Differs from EPP as it monitors and triggers on behaviours instead of signatures.
What is UEBA and what does it do?
User Entity Behavior Analytics- System that provides automated identfification of suspicious activity by user accounts and hosts. As there is so much data that needs analyising, AI is often used.
What is reverse engineering?
The process of analyzing the structure of hardware or software roto reveal more about how it functions.
What can malware writers do to hide the identification of the payload and author of the malware to make it harder to detect?
They can obfuscate the code before it is assembled or compiled to prevent analysis.
What is a disassembler?
A program that translates machine language (binary) into assembly language!
What is a magic number?
Looking at a HEX file and the first two bytes of the binary header that indicates it file type. e.g E2 = PNG file
What is assembly code?
Instructions that has been translated from hex codes.
What do we use to get from HEX code to assembly code?
A decompiler
What is high-level code?
Pesudo-code- something that is human readable.
Why are we looking to return code into a human readable format?
So we can look for strings- We can then write rules of those strings and block them!
What does the STRINGS tool do?
Dump all strings over three characters in ASCII or Unicode for analysis, no need for use of dissembler
What is a program packer?
Method of compression which and executable is mostly compressed and that part that isnt only contains the code to decompress the executable
What is shellcode?
Any lightweight code that is designed to run a exploit on a target
What is code injection?
Exploit technique that runs malicious code with the identification number of a legitimate process- e.g process number for Chrome is 10, you run malicious code under the process code 10, this would allow it to run.
What is living off the land?
When an attacker uses the tools already installed on the computer to continue the attack. e.g using powershell for malicious reasons.
What free, open-source tool, provided by Microsoft can be used for behavior analysis?
Sysinternals by Microsoft
What processes will always be running if you look in your process tab in windows explorer?
System Idle (PID 0) and System (PID 4)
What manages low level windows functions and is fine if you see several running providing they are run from SystemRoot/System32 and have no parent?
Client Server Runtime Subsystem (csrss.exe)
What manages drivers and services and should only have a single instances running as a process?
WININIT (Wininit.exe)
What is the most popular process hackers use to masquerade malware?
Services.exe