Information Security & Risk Management Flashcards
Incident Response
Incident response defines how to handle an incident as soon as it is discovered. Contain and counter a threat before it causes additional damage.
Incident Response includes six important guidelines
Preparation
Identification
Containment
Eradication
Recovery
Lesson Learned
Incident Response includes six important guidelines
Preparation
Identification
Containment
Eradication
Recovery
Lesson Learned
Stuxnet
A computer worm, the first cyberweapon capable of crippling critical government infrastructure and system operations.
Botnet
is a network of hijacked internet connected devices. Attackers perform malicious actions on the bots or use them to attack other devices. Typically DDos
Notable Botnet attacks
Information Theft- harvest sensitive data from the controlled bots.
Crypto Mining- Can use the bot’s hardware to perform crypto mining.
Spam mail- Can use bots to send phishing emails.
DDos- The botnet can be used to perform a Distributed Denial Of Service.
Brute Force- bots can perform brute-force against login interfaces.
Botnet: Blue Team Aspect
Strengthens organization’s defenses including endpoint security suites, strong password requirements, and implementation of the least privilege principle.
Botnet: Red Team
Create and maintain large, efficient, and legal botnets in a cloud environment. A large volume of botnets can launch serious attacks to overwhelm an organization’s services and defenses, for testing.
File-less malware
Malicious software that uses a legitimate program to infect a computer. Makes it difficult for Antivirus Programs to identify and delete these malwares.
File-less malware Vulnerabilities
In order to bypass antivirus detection, fileless malware operates in the computer’s memory. That way, the code of the malicious software resides inside the memory without touching the hard drive.
File-less malware Defensive
Computer memory scans are useful for detecting and preventing fileless malware activities.
Keylogger
a program that subsequentially records the user’s keystrokes. They can be used to gather sensitive data.
Keyloggers: Blue Team
The best way to protect against keyloggers is user awareness. By ensuring that company employees only download files from verified and familiar websites, the team will prevent most keylogger attacks.
Keylogger: Red Team
Keyloggers are used to collect data that attackers may use to take over digital corporation assets. Once ethical hackers capture credentials they have the opportunity to go for higher level privilege.
Trojan
A type of malware that masquerades as a legitimate program to trick users into opening files. When executed, the trojan can compromise the computer by stealing or deleting files and folders, and attackers use it to create sockets in remote computers.
(Social Engineering)