InfoSec Part 2 Flashcards

1
Q

What is malware?

A

Bad as in, software that is intended to:
Disable computer systems
Disrupt operations
Steal data
A program that must be executed to have any impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keylogger

A

Logs your keystrokes (recording passwords, intellectual property)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bot

A

Waiting for the command signal to do something on a computer
Remote control and allows cybercriminal to do anything they want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Encrypt your data and demand a ransom payment if you want it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of systems targeted by malware … and which platform suffered nearly half of malware infections as of mid-2021?

A

Computers (Windows, Macintosh OS X, Linux)
Mobile devices (Android, iOS, etc.)
50% of all malware infections occur on Android phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojans – what are they, and how do they compromise systems?

A

Hidden malware (utility software, game, bogus software updates)
No need for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Banking Trojans

A

Stealing financial info
Spoofing
Keylogger
Man-in-the-middle
TrickBot, Panda, Kronos, Zeus, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Access Trojans

A

RAT Explosion
Read messages, monitor GPS location, record audio from mic, take pictures, etc.
Broad range of targets
Access
Modular, flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fake Antivirus Trojans

A

Simulate the activity of antivirus software or parts of the OS security modules
Designed to extort money from users in return for the detection and removal of threats that are nonexistent
Repeated pop ups to make the user worry and pay for fake antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses – what are they, and how do they propagate?

A

Hides itself inside host file. Self -replicating malware

Payloads - (Key-loggers, File destruction, None)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a macro? What is a macro virus?

A

Script capability in Office apps and others
Written code full of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms – what are they, and how do they propagate?

A

Stand-alone malware
- No “useful program”
- No infected host file
Self-propagating via network
Exploits vulnerabilities to invade systems
Similar payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is Email a powerful attack vector?

A

Ubiquitous (everyone has one)
Distribute as attachments, links
Large threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

A scam by which an email user is duped into revealing personal or confidential info which the scammer can use illicitly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What three key scam techniques are used in a phishing attack?

A

Seems legit — spoofing
Sense of urgency
Call to action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spoofing? How is it used in phishing?

A

Message claims to be legit, but isn’t
Graphics are legit because attackers use graphics from the real site
Link looks legit, but it’s just text so it means nothing; hover over the link
Used in phishing to collect private data and deliver malware payload
Gain your trust
Fan the flames of urgency
So that you will take action now!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can one avoid phishing scams?

A

Be suspicious of urgent requests
Be suspicious of requests for personal info
Check with the sender
Call them
Don’t use contact info on the phish
Don’t use links in an email
Type into a browser instead!
Employee training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is spear phishing different from phishing? Consider the target and methods used.

A

Spear phishing is a targeted attack
Researched the target
Carefully crafted email
Apparently valid source
Personalized
Nicknames
Habits, preferences
Recent purchases
Recent promotions or job changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Malvertising?

A

Using online advertising to promote malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Drive-by Downloads

A

No interaction required
Exploits client vulnerability: OS, browser, plugin
Process:
Page loaded
Fingerprint analyzed
Vulnerabilities exploited
Malware downloaded & installed
Victim compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can one defend against web-based malware?

A

Minimize use of Admin account
Keep OS, browser, plugins up-to-date
Minimize the attack surface
Be careful with popups!
Use an ad blocker!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cables

A

Weaponized to inject a payload

23
Q

USB Keylogger

A

Computers trust keyboards
Device pretended to be keyboard, plug it in, and gains access
Streams data to the Cloud so the attacker can watch live when talking
Smart logger: activated on user activity
Can inject keystrokes remotely

24
Q

Biohacking

A

implants technology within your body
RFID emulator chips
Works with NFC capable smartphone sand certain commercial access control systems and door locks and USB contactless readers
Swipe hand at door lock and it opens up
Uses: car keys, passwords, office keys, ID badge, NFC touchless payments in stores

25
Q

What is a Man-in-the-Middle (MitM) attack?

A

An attack where the attacker sits between two communicating hosts and transparently captures, monitors, and relays all communication between the hosts

26
Q

How can an attacker execute an MitM attack against open WiFi hotspot users?

A

WiFi Pineapple
Will intercept in the middle of your device and the access point
Can present a registration screen to collect personal info prior to letting you into their “free hotspot”
Hackers can intercept data, deliver webpages to your machine that possibly contain attacks

27
Q

How can one defend against this threat?

A

Switch off Wifi on mobile phone and just use cellular
Tether notebook to phone’s cellular service
VPN: encrypt your data from your point to the in-point

28
Q

What is the “vulnerability” being exploited in a Denial of Service (DoS) attack?

A

Heavy reliance on servers
e-Commerce
Communications
Enterprise applications
Capacity
Servers have maximum capacity
Exceeding maximums -> problems

29
Q

How does DoS attack harm the victim?

A

Overwhelms the target server with service requests
Deny service to regular customers
Attack consumers all server capacity
Nothing left for regular customers
Customers frustrated, go elsewhere
“The straw that broke the camel’s back”

30
Q

How does a DDoS attack work?

A

Distributed denial of services
Attack comes from every direction at once

31
Q

Botnets of Zombies

A

Lays silent until Command & Control tells them what to do

32
Q

Command & Control Network

A

Lets cybercriminal control the Botnet to make it do their will

33
Q

How frequently do DDoS attacks occur?

A

2013: 11% attacked 11-50 times/month
2021: 70% attacked 20-50 times/month

34
Q

Roughly what is the cost of a typical DDoS attack to a small business?

A

Costs up to $120,000
Up to $2 million for LARGER companies

35
Q

Why is data classification a necessary step in risk management?

A

Data is an asset
Protection based on value
Tangible
Intangible . . . consider CIA
UF classifications
Open
Sensitive
Restricted

36
Q

What three factors can be used to quantify IT security risk? How are they used together to estimate risk?

A

Multi-disciplinary
Wide variety of skills and people
Types of risks
Estimate the risk
1. Asset value
2. Threat likelihood
3. Threat severity

37
Q

Be able to explain the three ways that an organization can respond to IT security risk.

A

Accept the risk
Refuse the risk
Mitigate the risk (minimize)
Technical measures, training, policy, insurance

38
Q

Defense in depth – how does the castle metaphor apply to information security?

A

Multiple layers of defense
Get notified if one of the layers goes down

39
Q

Human vulnerabilities – what measures are suggested for addressing them?

A

Education/Awareness Training
- “An ounce of prevention is worth a pound of cure”
- Training courses
- Hands-on, e.g. simulated phishing
HR practices
- Hiring
- Exit procedures

40
Q

Endpoint Protection

A

User computer have unpatched operating systems and applications
Patching
Anti-malware
Firewall

41
Q

Intrusion Detection

A

Monitors network, looking for certain packets of data going in and out and can notify someone of a problem

42
Q

Vulnerability Scanning

A

Identify systems that need to be patched
Scan
Notify
Remediate
Repeat
Report

43
Q

Penetration Testing

A

Internal (IT Team)
External security consultants
Social engineering and technological
Disaster Recovery Testing
Perform restore and verify systems work
Simulated disasters

44
Q

Physical vulnerabilities – be able to briefly describe the steps an organization can take to protect mobile devices … and to protect USB flash drives.

A

Corporate endpoints
BYOD and mobile
USB flash drives
Disposal
Equipment disposal

45
Q

Corporate endpoints

A

Inventory control
Hard drive encryption

46
Q

BYOD and mobile

A

Encryption
Mobile device management

47
Q

USB flash drives

A

Encryption
Ban them!

48
Q

Disposal

A

Shred documents
Records management vendor

49
Q

Equipment Disposal

A

DBAN
Keep your hard drive
Copier vendor data security options

50
Q

What’s the “fastest and cheapest bang for your buck” when it comes to information security?

A

User education training to counteract those threats
Educate users about computer security

51
Q

Be able to briefly explain the importance of password complexity.

A

Brute force attacks
Dictionary attacks
Complex enough
- Length
- Uppercase, lowercase, numbers, symbols
- Not ‘words’
- Passphrases
Expiration

52
Q

What is a ‘passphrase’ and why might this be a better approach than a complex password?

A

20 letter phrase that is easy to remember, but too long for an attacker to enter
Combination of words/phrases that the user would remember

53
Q

What is MFA? Be able to briefly explain how it works and how it can improve IT security

A

Multi-factor authentication
Something you know (password) and something you have (key fob/app on phone)
Ex. Duo Push UF app

54
Q

What are the principles of least privilege and role-based access controls? Be able to explain how these concepts can be used to improve an organization’s IT security.

A

Security rights — ACL (Access Control List)
Access to read/edit certain things
Principle of Least Privilege
“User given no more privilege than is necessary to perform a job”
Role based access controls
Your role is different than that of the supervisor