Guest Lecture 4 Flashcards
1
Q
What is the difference between Cyber security and Cyber Operations
A
• Cyber security
– A state where CIA is maintained against cyber threats
– Guided by a policy
• Cyber Operations
– An activity to protect and defend against cyber threats
– Guided by military objectives or business goals
2
Q
Which steps are covered in the “Cyber kill chain”?
A
- Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
- Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
- Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives)
- Exploitation: Malware weapon’s program code triggers, which takes action on target network to exploit vulnerability.
- Installation: Malware weapon installs access point (e.g., “backdoor”) usable by intruder.
- Command and Control: Malware enables intruder to have “hands on the keyboard” persistent access to target network.
- Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom.
3
Q
What Defensive courses of action can be taken against a Cyber kill chain attack?
A
- Detect: Determine whether an intruder is present.
- Deny: Prevent information disclosure and unauthorized access.
- Disrupt: Stop or change outbound traffic (to attacker).
- Degrade: Counter-attack command and control.
- Deceive: Interfere with command and control.
- Contain: Network segmentation changes