Introduction To Ethical Hacking Flashcards

1
Q

What is Information Security

A

Information security refers to the protection of information systems and data of an organization by mitigating information risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Confidentiality

A

Only Authorized people can see this data or access this system or network.

💡 Controls: * Encryption * classification * access control * proper disposal (e.g. of DVDs, CDs, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Integrity

A

The data has not been changed or modified in anyway specially unauthorized way

💡 Controls: * Hashing * access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Availability

A

Authorized shall have access whenever they want
Think of DOS attack, if I shut down your ability to gain access to a website you availability is lost, is no longer available

💡 Controls: * redundancy* data back-ups * antivirus * DDoS prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Authenticity

A

transit or communication methods was used was authentic.

💡 Controls: * users (biometrics) * smart cards * data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.

💡 Controls: digital signatures, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack depends on three components

A

Attack = Motive(Goal) + Vulnerability + Method (exploit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Motives behind attacks

A
  • Disrupting business continuity
  • Information theft and manipulating data
  • Financial loss to the target
  • Taking revenge
  • Demanding ransom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is threat

A

Threatmeans anything that has potential of causing damage to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Attack Classification

A
  • Passive Attacks
  • Active Attacks
  • Close-In Attacks
  • Insider Attacks
  • Distribution Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Passive Attacks

A

Gain information about targeted computers and networkswithout direct interaction with the systems.
Google Search,
Public records,
Social Media,

Passive Attacks Example
- Packet Sniffing
- Network Traffic Analysis
- Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Active Attacks

A

Involves direct interaction with the target.
Make a phone call to the target,

Tools like:
Nmap, Nessus, OpenVAS, Nikto and Metasploit can be considered as Active Recon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Close-In Attacks

A

These attacks are possible through close proximity
1. Being physically near the target

Close-In Attacks
- Social Engineering attacks
- Shoulder surfing attacks
- Dumpster Diving attack
- Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Insider Attacks

A
  1. Assumed Level of trust
  2. performed with a trusted person.
  3. Physical access

Example of Insider Attacks
- Intellectual Property
- Customer PII
- Stolen devices
- Installing malware and Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Distribution Attack

A

Tamper with the hardware or software prior installation.
Aka Supply-Chain Attack
Compromising software and/or Hardware before customer installation

Examples of Distribution Attacks
- Solarwinds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Information Warfare?

A

Attempting to gain a competitive advantage through attacks against target’s IT system

Weapons include
- viruses
- worms
- trojan horses
- electronic jamming

17
Q

C2 Warfare - (Command & Control Warefare)

A

The Control over compromised target system with centralized management

18
Q

Intelligence-Based Warfare

A

The design and protection of system that seek sufficient knowledge to dominate the battlespace and the denial of such knowledge to the adversary

19
Q

Electronic Warfare

A

I want to stop communications between advasary (Enemies)
AKA “Jamming”

20
Q

What is Psychological Warfare

A

Attacking the morale and mental resolve off opponent
Attempt to get the opponent to GIVE UP
- Propaganda
- Terrorism

21
Q

Hacker Warfare

A

Soldiers of Information Security’
Acquire information about subject A, sell it to subject B.
- Attack Targets System (DOS/DDOS)
- Theft of data and/or System
- Disinformation campaign

22
Q

Economic Warfare

A

Interfere with targets’s economic/Financial Capabilities
Weaken Target’s economy
- Theft of IP
- Reputational Influence

23
Q

Cyber Warfare

A

use of information systems against virtual personas
Similar to information warfare in it’s definition
- Includes
- Information Terrrorism
- Semantic Attacks
- Take over of target system by where the appearance of normal operation (stuxnet)

24
Q

Defensive Information Warfare

A
  • use actions or strategies to defend against attacks.
  • Detection/ Prevention
  • Alerts
  • Response
  • Deterrents
  • Emergency Preparedness
25
Q

Offensive Information Warfare

A
  • Attacks against an opponent
  • involve attacks against attackers.
  • Web Attacks
  • System Attacks
  • MITM/ Replay/ Session Hijacking
  • Malware Attacks
26
Q

What is Cyber Kill Chain

A

The Cyber Kill Chain is a framework that is used to for identification and prevention of cyber activity
Developed by LockHead-Martin around 2011
The seven steps of the Cyber Kill Chain, It provide greater insight into attack phase, which helps security professionals to understand the adversary’s tactics, techniques and procedures.

27
Q

7 Phases of Cyber Kill Chain

A

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Controls
Actions and Objectives

28
Q

What is Tactics, Techniques & Procedures

A

TTPS; Tactics, Techniques and Procedures:- are helpful to analyze threats and threat actors that used to strengthen the security of the organization.
The purpose is to identify patterns of behavior which can be used to defend against specific strategies and threat vectors used by malicious actors.

29
Q

Explain Tactics

A

Guidelines that describe the way attackers perform their attacks from beginning to the end;

  • I want to gather networking information about my target
  • I want to find out what services my target is running
  • What vulnerabilities does my target have
30
Q

Explain Techniques

A

The technical methods that attackers use to achieve their goals; help to identify vulnerabilities and implement measures in advance.
- Perform DNS queries using dig
- Perform network scan and banner grabbing
- Perform vulnerability scanning against my target

31
Q

Explain Procedures

A

Defines as the organizational approaches followed by threat actor to launch their attacks, help to identify what an attacker is looking for.

32
Q

Adversary Behaviors Identification

A

Adversary Behavioral identification involves the identification of the common methods or techniques to launch attacks to penetrate an organization’s network

Adversary Behaviors Identification is refers to identification of the techniques are that used to penetrate a system