Introduction To Ethical Hacking Flashcards
What is Information Security
Information security refers to the protection of information systems and data of an organization by mitigating information risks.
Explain Confidentiality
Only Authorized people can see this data or access this system or network.
💡 Controls: * Encryption * classification * access control * proper disposal (e.g. of DVDs, CDs, etc.)
Explain Integrity
The data has not been changed or modified in anyway specially unauthorized way
💡 Controls: * Hashing * access control
Explain Availability
Authorized shall have access whenever they want
Think of DOS attack, if I shut down your ability to gain access to a website you availability is lost, is no longer available
💡 Controls: * redundancy* data back-ups * antivirus * DDoS prevention
Explain Authenticity
transit or communication methods was used was authentic.
💡 Controls: * users (biometrics) * smart cards * data
Non-Repudiation
Guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
💡 Controls: digital signatures, logging
An attack depends on three components
Attack = Motive(Goal) + Vulnerability + Method (exploit)
What are the Motives behind attacks
- Disrupting business continuity
- Information theft and manipulating data
- Financial loss to the target
- Taking revenge
- Demanding ransom
What is threat
Threatmeans anything that has potential of causing damage to the system.
What are Attack Classification
- Passive Attacks
- Active Attacks
- Close-In Attacks
- Insider Attacks
- Distribution Attacks
What are Passive Attacks
Gain information about targeted computers and networkswithout direct interaction with the systems.
Google Search,
Public records,
Social Media,
Passive Attacks Example
- Packet Sniffing
- Network Traffic Analysis
- Decryption
What are Active Attacks
Involves direct interaction with the target.
Make a phone call to the target,
Tools like:
Nmap, Nessus, OpenVAS, Nikto and Metasploit can be considered as Active Recon.
What are Close-In Attacks
These attacks are possible through close proximity
1. Being physically near the target
Close-In Attacks
- Social Engineering attacks
- Shoulder surfing attacks
- Dumpster Diving attack
- Eavesdropping
What are Insider Attacks
- Assumed Level of trust
- performed with a trusted person.
- Physical access
Example of Insider Attacks
- Intellectual Property
- Customer PII
- Stolen devices
- Installing malware and Keyloggers
What are Distribution Attack
Tamper with the hardware or software prior installation.
Aka Supply-Chain Attack
Compromising software and/or Hardware before customer installation
Examples of Distribution Attacks
- Solarwinds