Information Security & Risk Management Flashcards

1
Q

Incident Response

A

Incident response defines how to handle an incident as soon as it is discovered. Contain and counter a threat before it causes additional damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response includes six important guidelines

A

Preparation
Identification
Containment
Eradication
Recovery
Lesson Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Response includes six important guidelines

A

Preparation
Identification
Containment
Eradication
Recovery
Lesson Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stuxnet

A

A computer worm, the first cyberweapon capable of crippling critical government infrastructure and system operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

is a network of hijacked internet connected devices. Attackers perform malicious actions on the bots or use them to attack other devices. Typically DDos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Notable Botnet attacks

A

Information Theft- harvest sensitive data from the controlled bots.
Crypto Mining- Can use the bot’s hardware to perform crypto mining.
Spam mail- Can use bots to send phishing emails.
DDos- The botnet can be used to perform a Distributed Denial Of Service.
Brute Force- bots can perform brute-force against login interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnet: Blue Team Aspect

A

Strengthens organization’s defenses including endpoint security suites, strong password requirements, and implementation of the least privilege principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnet: Red Team

A

Create and maintain large, efficient, and legal botnets in a cloud environment. A large volume of botnets can launch serious attacks to overwhelm an organization’s services and defenses, for testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File-less malware

A

Malicious software that uses a legitimate program to infect a computer. Makes it difficult for Antivirus Programs to identify and delete these malwares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File-less malware Vulnerabilities

A

In order to bypass antivirus detection, fileless malware operates in the computer’s memory. That way, the code of the malicious software resides inside the memory without touching the hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

File-less malware Defensive

A

Computer memory scans are useful for detecting and preventing fileless malware activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keylogger

A

a program that subsequentially records the user’s keystrokes. They can be used to gather sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keyloggers: Blue Team

A

The best way to protect against keyloggers is user awareness. By ensuring that company employees only download files from verified and familiar websites, the team will prevent most keylogger attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger: Red Team

A

Keyloggers are used to collect data that attackers may use to take over digital corporation assets. Once ethical hackers capture credentials they have the opportunity to go for higher level privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan

A

A type of malware that masquerades as a legitimate program to trick users into opening files. When executed, the trojan can compromise the computer by stealing or deleting files and folders, and attackers use it to create sockets in remote computers.
(Social Engineering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IT Team Aspect: Trojan

A

IT teams must install IDS(Intrusion Detection System) and IPS systems to detect and prevent trojan attacks.

17
Q

Red Team Aspect: Trojan

A

The red team can use Trojan files to access restricted areas in an organization’s systems through social engineering tactics as part of the penetration testing operations.

18
Q

Worms

A

A computer worm is a type of malware that in addition to the malicious actions it performs on the computer, can also replicate itself and spread to other computers.

19
Q

How does it spread?

A

A computer worm uses its ability to spread in systems and networks, and once it reaches its target, it replicates itself. The worm can perform acts such as delete or modify files, inject a malicious payload in software, and increase the system’s resource consumption.

20
Q

Worm Indications

A

Abnormal network traffic
Slow system performance.
Emails and files sent without the user’s knowledge
Unusual system behavior
Operations are performed by the computer without user commands.

21
Q

Blue Team Aspect: Worms

A

Monitoring is an important factor in preventing such occurrences. When a worm is in a target system, it scans the network for additional vulnerable targets, and the scanning-related operations generate security logs that the blue team can use to monitor and identify the presence of a worm in the organization’s computer.

22
Q

Red Team Aspects:

A

Red team uses worms to spread Trojans and viruses, create a backdoor, or dump sensitive information from the targeted compute systems, as part of their penetration testing tasks.

23
Q

Backdoor

A

A backdoor refers to any method by which authorized and unauthorized users can gain access to a computer.

24
Q

Types of backdoors

A

Hardware
Default Passwords-
Application and Systems
Operating Systems
APIs

25
Q

Backdoor Detection and Prevention

A

Backdoors can be detected is by monitoring user behavior with high-level permissions and noticing unusual data spikes, such as connections to suspicious IP addresses.
Prevention- Antivirus software that can detect a wide range of malware. Another way to prevent backdoors is by using firewalls that can monitor all incoming and outgoing traffic on a device. If external network traffic attempt to enter the device, the firewall can block it.

26
Q

Red Team Aspect: Backdoor

A

Use backdoor to simulate bypassing security measures, demonstrate how an attacker can do so in a real-life scenario.

27
Q

Blue Team Aspect: Backdoor

A

Blue teams apply 24/7 monitoring of all devices and networks, to detect any suspicious activity. Prevention and detection measures are implemented using security techniques, such as firewalls, IPS, EDR, endpoint solutions, and others.

28
Q

CIA Triads

A

Confidentiality- Only authorized personnel, whereby the data is passed only between sender and recipient. Encryption is an essential factor in maintaining confidentiality, ensuring that the data can be shared using keys to encrypt and decrypt it.
Integrity- The ability to ensure reliability, consistency, and accuracy of information or data.
Availability- the concept of ensuring that data or services are accessible to authorized users who need them.

29
Q

Ransomware

A

Ransomware is a type of a malicious program that attackers use to encrypt the victim’s data and hold it captive while demanding cryptocurrency payment to unlock the data.

30
Q

Blue Team Aspect: Ransomware

A

Many companies implement the necessary security measures and network protection solutions, such as firewalls, IDS, IPS, and WAF, to safeguard their assets and data against these attacks.

31
Q

Programmer Aspect: Ransomware

A

Programmers of cybersecurity tools need to find solutions and modern and sophisticated ransomware.