Intro to Ethical Hacking Flashcards
What this Module Covers
Describe the elements of information security
Explain information security attacks and information warfare
Describe cyber kill chain methodology, TTPs, and IoCs
Describe hacking concepts, types, and phases
Explain ethical hacking concepts and scope
Understand information security controls (defense-in-depth, risk management, cyber threat intelligence, threat modeling, incident management process, and AI/ML)
Know about the information security acts and laws
Module Flow
- Information Security Overview
- Cyber Kill Chain Concepts
- Hacking Concepts
- Ethical Hacking concepts
- Informartion Security Controls
- Information Security Laws and Standards
Major 5 Elements of information Security
Confidentiality
Integrity
Availability
Authenticity
Non-Repudiation
Confidentiality
The information or data is acccessible only by an authorized users
Integrity
Prevent the data from unauthorized changes
Availability
Assuring that the system responsible for transfering, storing and processing an informations are accesible by when required by authorized concerns
Authenticity
Ensures the quality of data genuinity
The major role of authenticity is to ensure that user is genuine
Non-Repudiation
A guarantee that the sender of a message can’t deny later of sent message
And the reciepient cant deny the reciept of message
Confidentiality Breaches
May occur due to improper data handling or hacking attempt
Confidentiality controls
Data Clasification
Data Encryption
Proper disposal of equipments(Such as HDD,USB,PC,RAM etc.)
Measure of integrity
Checksum:
A number produce by a mathametical fuction to verify that a given block of data is not changed
Measures of Availability
Disk Arrays for redundant system and cluster machine
Ativirus software to combat malware
Distributed denial of service prevention systems
Authenticity controls
Biometric
Smart Card
Digital certificates
Measure of Non-Repudiation
Using a Digital signature to ensure non repudiation
Topic covers in information security overview
Elements of information security
Classification of attacks
information warefare
Attacks
Motive(Goal) + Method + Vulnerability
Attack Motives
Attack motives orginate by targeting a valuable resource either its a data / information processing systems.
System Vulnerabilities allow hackers to attempt an attack using attack techniques
Motive behine Information security attack
Distrupting bussiness continuity
Stealing information and manipulating data
Creating fear and chaos by disrupting critical infrastructures
Causing financial loss to the target
Propagating religious or political belifs
Achiving state military objectives
Damaging the reputation of the target
Taking revenge
Demanding ransom
Clasification of Attack
Passive Attacks Active Attacks Close-in-Attacks Insider Attacks Distribution Attacks
Passive Attacks
Intercepting, monitoring network traffics,data flow on the target network
Not tamper with the data
Attacker perform reconnaissance on network trafic using sniffer
This kind of attack is difficult to detect ,becoz attacker not interact with endusers system
Example of passive attacks
Sniffing eavesdropping Footprinting Network traffic analysis Decryption of weakly encrypted files
Active attacks
Tamper with data in transit or break into the security system
Penetrate or infect the target internal networks and gain access to remote system to compromise the internal network
Example of Active attacks
DOS
Man-in-Middle
Session Hijackig
SQL Injection
Firewall and IDS attack
Bypassing protection mechanisms
profiling
Malware attacks
Priviledge escalation
Backdoor access
Spoofing attacks
Cryptography attacks
Replay attacks
Password based attacks
XSS attacks
Exploitation of application and os software
DNS and ARP poisoning
Compromised Key attack
Close-In Attacks
Attacker performed an attack by physicaly close to the target system or network to gather the information to perform the attack
Example of close-IN attack
Social Engineering such as eavesdropping,
Shoulder surfing
dumpster diving
Insider Attack
Insider attacks involve using privileged access to voilate rules
or
Intentionally cause a threat to the organizations information
Example of Insider attack
Planting keyloggers, Backdoors, Malware Eavesdropping wiretapping Theft of physical devices Data theft and Spoliation Pod slurping Social engineering
Distributing Attacks
Tamper with hardware or software prior to installation
Example of Distributing Attacks
Modification of software or hardware during production
Modification of software or hardware during distribution
Information warfare
Refers to use of ICT (information and comunication technologies) for competitive advantages over an opponent
Example of Information Warfare
Viruses, Worms, Torjan Horses, Logic Bombs, Trap doors, Nanomachines, Microbes, Electronic Jamming, Penetration expolits and tools
Martin Libicki Information warfar categories
Command and Control (C2 Warfar) Intelligence-Based warfare Electronics Warefare Psychological warfare Hacker warefare Economic warfare Cyberwarfare
Command & Control Warefare
Impact an attacker possesses over a compromised system
Intelligence-based warfare
Sensor-based technology that directly corrupts technologies systems
Electronic Warfar
Uses radio-electronic and cryptographic techniques to degrade communication
Radio electronic technic attack the physical
Cryptographic technic use bit and bytes to distrupt
Psychological warfar
Uses various techniques such as propaganda and terror to demoralize one’s adversary in an attempt to succeed in battle