IAS LESSON 3 Flashcards
this is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime
forensic analysis
this aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker
forensic analysis
refers to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems attacked
forensic analysis in the context of cybersecurity
explain forensic analysis in your own words
Forensic analysis is like being a digital detective, searching for clues on computers and phones to solve crimes. It involves recovering deleted files and hidden data, analyzing the information to understand what happened, and preserving the evidence for use in court.
practices where governments or governmental organizations perform surveillance and data collection at a national state
mass dataveillance
performs surveillance and data collection on an individual of interest
personal dataveillance
observation attacks, perturbation attacks, and hardware-targeted software attacks are classified as
physical attacks
the attacks can target the hardware, the network, the system, the applications, or the user themselves.
intrusion attacks
these are physical attacks based on the observation of the circuit behavior during a computation
side-channel analysis (sca) or observation attacks
attacks where a device undergoes modification of physical parameters in order to obtain an incorrect behavior
fault/perturbation attacks (i.e. power glitches, clock glitches, laser pulses, and electromagnetic pulses)
an example of this is the rowhammer attack, flipping memory bits while reading and writing another cell; effective on SSD disks
hardware-targeted software attacks
this refers to finding a path for each packet sent on the internet, no matter its source and its destination; this can isolate a whole country or redirect all traffic through a surveillance point
routing
a hierarchical decentralized naming system for the internet, with scalability and flexibility as key design goals; used for address resolution
Domain name system (DNS)
the server cannot handle the load and thus does not respond to legitimate queries
Denial of Service (DOS)
IP datagram are also known as
packets
what are the two types of routing protocols
autonomous systems (single organization) and interconnection level (internet backbone level)
this is the protocol currently in use on the internet for the exchange of routing and reachability information among autonomous systems
Border Gateway Protocol
Peeking is irresistible. If there is information visible in the packet,
there is no way to keep an intermediate node from looking at it. So the ultimate defense of the end to end mode is
end-to-end encryption
advanced and leveraging higher social intelligence to make people confident in the legitimacy of the request they received
spear fishing
who are the weakest link in the security chain
users who are unaware of security issues and therefore easily deceived by simple attacks
this aims at convincing the user to perform an action/provide sensitive information by gaining their trust
social engineering
emotions, memory, or beliefs are referred to as
cognitive biases
why is the education and awareness of good practice and cyber hygiene strategy of every computer user crucial
possible answers:
- avoid fake news
- mitigating cyber threats