InfoSec Part 2 Flashcards

1
Q

What is malware?

A

Bad as in, software that is intended to:
Disable computer systems
Disrupt operations
Steal data
A program that must be executed to have any impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keylogger

A

Logs your keystrokes (recording passwords, intellectual property)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bot

A

Waiting for the command signal to do something on a computer
Remote control and allows cybercriminal to do anything they want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Encrypt your data and demand a ransom payment if you want it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of systems targeted by malware … and which platform suffered nearly half of malware infections as of mid-2021?

A

Computers (Windows, Macintosh OS X, Linux)
Mobile devices (Android, iOS, etc.)
50% of all malware infections occur on Android phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojans – what are they, and how do they compromise systems?

A

Hidden malware (utility software, game, bogus software updates)
No need for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Banking Trojans

A

Stealing financial info
Spoofing
Keylogger
Man-in-the-middle
TrickBot, Panda, Kronos, Zeus, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Access Trojans

A

RAT Explosion
Read messages, monitor GPS location, record audio from mic, take pictures, etc.
Broad range of targets
Access
Modular, flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fake Antivirus Trojans

A

Simulate the activity of antivirus software or parts of the OS security modules
Designed to extort money from users in return for the detection and removal of threats that are nonexistent
Repeated pop ups to make the user worry and pay for fake antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses – what are they, and how do they propagate?

A

Hides itself inside host file. Self -replicating malware

Payloads - (Key-loggers, File destruction, None)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a macro? What is a macro virus?

A

Script capability in Office apps and others
Written code full of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms – what are they, and how do they propagate?

A

Stand-alone malware
- No “useful program”
- No infected host file
Self-propagating via network
Exploits vulnerabilities to invade systems
Similar payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is Email a powerful attack vector?

A

Ubiquitous (everyone has one)
Distribute as attachments, links
Large threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

A scam by which an email user is duped into revealing personal or confidential info which the scammer can use illicitly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What three key scam techniques are used in a phishing attack?

A

Seems legit — spoofing
Sense of urgency
Call to action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spoofing? How is it used in phishing?

A

Message claims to be legit, but isn’t
Graphics are legit because attackers use graphics from the real site
Link looks legit, but it’s just text so it means nothing; hover over the link
Used in phishing to collect private data and deliver malware payload
Gain your trust
Fan the flames of urgency
So that you will take action now!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can one avoid phishing scams?

A

Be suspicious of urgent requests
Be suspicious of requests for personal info
Check with the sender
Call them
Don’t use contact info on the phish
Don’t use links in an email
Type into a browser instead!
Employee training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is spear phishing different from phishing? Consider the target and methods used.

A

Spear phishing is a targeted attack
Researched the target
Carefully crafted email
Apparently valid source
Personalized
Nicknames
Habits, preferences
Recent purchases
Recent promotions or job changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Malvertising?

A

Using online advertising to promote malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Drive-by Downloads

A

No interaction required
Exploits client vulnerability: OS, browser, plugin
Process:
Page loaded
Fingerprint analyzed
Vulnerabilities exploited
Malware downloaded & installed
Victim compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can one defend against web-based malware?

A

Minimize use of Admin account
Keep OS, browser, plugins up-to-date
Minimize the attack surface
Be careful with popups!
Use an ad blocker!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cables

A

Weaponized to inject a payload

23
Q

USB Keylogger

A

Computers trust keyboards
Device pretended to be keyboard, plug it in, and gains access
Streams data to the Cloud so the attacker can watch live when talking
Smart logger: activated on user activity
Can inject keystrokes remotely

24
Q

Biohacking

A

implants technology within your body
RFID emulator chips
Works with NFC capable smartphone sand certain commercial access control systems and door locks and USB contactless readers
Swipe hand at door lock and it opens up
Uses: car keys, passwords, office keys, ID badge, NFC touchless payments in stores

25
What is a Man-in-the-Middle (MitM) attack?
An attack where the attacker sits between two communicating hosts and transparently captures, monitors, and relays all communication between the hosts
26
How can an attacker execute an MitM attack against open WiFi hotspot users?
WiFi Pineapple Will intercept in the middle of your device and the access point Can present a registration screen to collect personal info prior to letting you into their “free hotspot” Hackers can intercept data, deliver webpages to your machine that possibly contain attacks
27
How can one defend against this threat?
Switch off Wifi on mobile phone and just use cellular Tether notebook to phone’s cellular service VPN: encrypt your data from your point to the in-point
28
What is the “vulnerability” being exploited in a Denial of Service (DoS) attack?
Heavy reliance on servers e-Commerce Communications Enterprise applications Capacity Servers have maximum capacity Exceeding maximums -> problems
29
How does DoS attack harm the victim?
Overwhelms the target server with service requests Deny service to regular customers Attack consumers all server capacity Nothing left for regular customers Customers frustrated, go elsewhere “The straw that broke the camel’s back”
30
How does a DDoS attack work?
Distributed denial of services Attack comes from every direction at once
31
Botnets of Zombies
Lays silent until Command & Control tells them what to do
32
Command & Control Network
Lets cybercriminal control the Botnet to make it do their will
33
How frequently do DDoS attacks occur?
2013: 11% attacked 11-50 times/month 2021: 70% attacked 20-50 times/month
34
Roughly what is the cost of a typical DDoS attack to a small business?
Costs up to $120,000 Up to $2 million for LARGER companies
35
Why is data classification a necessary step in risk management?
Data is an asset Protection based on value Tangible Intangible . . . consider CIA UF classifications Open Sensitive Restricted
36
What three factors can be used to quantify IT security risk? How are they used together to estimate risk?
Multi-disciplinary Wide variety of skills and people Types of risks Estimate the risk 1. Asset value 2. Threat likelihood 3. Threat severity
37
Be able to explain the three ways that an organization can respond to IT security risk.
Accept the risk Refuse the risk Mitigate the risk (minimize) Technical measures, training, policy, insurance
38
Defense in depth – how does the castle metaphor apply to information security?
Multiple layers of defense Get notified if one of the layers goes down
39
Human vulnerabilities – what measures are suggested for addressing them?
Education/Awareness Training - “An ounce of prevention is worth a pound of cure” - Training courses - Hands-on, e.g. simulated phishing HR practices - Hiring - Exit procedures
40
Endpoint Protection
User computer have unpatched operating systems and applications Patching Anti-malware Firewall
41
Intrusion Detection
Monitors network, looking for certain packets of data going in and out and can notify someone of a problem
42
Vulnerability Scanning
Identify systems that need to be patched Scan Notify Remediate Repeat Report
43
Penetration Testing
Internal (IT Team) External security consultants Social engineering and technological Disaster Recovery Testing Perform restore and verify systems work Simulated disasters
44
Physical vulnerabilities – be able to briefly describe the steps an organization can take to protect mobile devices ... and to protect USB flash drives.
Corporate endpoints BYOD and mobile USB flash drives Disposal Equipment disposal
45
Corporate endpoints
Inventory control Hard drive encryption
46
BYOD and mobile
Encryption Mobile device management
47
USB flash drives
Encryption Ban them!
48
Disposal
Shred documents Records management vendor
49
Equipment Disposal
DBAN Keep your hard drive Copier vendor data security options
50
What’s the “fastest and cheapest bang for your buck” when it comes to information security?
User education training to counteract those threats Educate users about computer security
51
Be able to briefly explain the importance of password complexity.
Brute force attacks Dictionary attacks Complex enough - Length - Uppercase, lowercase, numbers, symbols - Not ‘words’ - Passphrases Expiration
52
What is a ‘passphrase’ and why might this be a better approach than a complex password?
20 letter phrase that is easy to remember, but too long for an attacker to enter Combination of words/phrases that the user would remember
53
What is MFA? Be able to briefly explain how it works and how it can improve IT security
Multi-factor authentication Something you know (password) and something you have (key fob/app on phone) Ex. Duo Push UF app
54
What are the principles of least privilege and role-based access controls? Be able to explain how these concepts can be used to improve an organization’s IT security.
Security rights — ACL (Access Control List) Access to read/edit certain things Principle of Least Privilege “User given no more privilege than is necessary to perform a job” Role based access controls Your role is different than that of the supervisor