ISC 3 - Security & Confidentiality Flashcards

1
Q

What is a replay attack?

A

a type of man-in-the-middle (MITM) attack in which a cybercriminal eavesdrops on secure network communications, intercepts it, and then “replays” the message at a later time to the intended target to gain access to the network and the data that is behind the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a return-oriented attack?

A

a technique that uses pieces of legitimate original system code (each a gadget) in a sequence to perform operations useful to the attacker. Each gadget ends with a “return” instruction causing the next gadget to execute and carry out complex operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of attack is race conditions?

A

an attacker exploits a system or application that relies on a specific sequence of operations. By forcing the application to perform two or more operations out of order or simultaneously, an attacker may gain unauthorized access or execute a fraudulent act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are covert channels?

A

mechanisms used to transmit data using methods not originally intended for data transmission by the system designer. They violate the entity’s security policy but do not exceed the entity’s access authorization, so they can communicate data in small parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are state-sponsored actors?

A

funded, directed, or sponsored by a nation. Known to steal and exfiltrate intellectual property, sensitive information, and even funds to further their nation’s espionage causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hacktivist?

A

a type of hacker operating to promote social causes or political agendas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an insider?

A

an employee that either organically developed into a person with malicious intentions or intentionally infiltrated an organization to achieve nefarious objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Advanced Persistent Threat (ATP)?

A

a hacking ring; could be sponsored by state governments or operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

consists of software or firmware intended to perform unauthorized processes that have an adverse impact on the confidentiality, integrity, or availability of an information system. Examples: viruses, worms, Trojan horses, adware, spyware, and other code-based programs that infect a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are rogue mobile apps?

A

malicious apps that appear legitimate. A fraudulent party creates a mobile application that is installed by a victim unsuspectingly and that app then steals information, gives the attacker unauthorized access, or executes some other malicious act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is spear phishing?

A

a social engineering attack in which employees in a corporate entity are targeted by posing as a legitimate department or employee, such as HR or the IT director. The goal is to obtain confidential information such as usernames, passwords, or personal data that can be used for exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNS spoofing?

A

a spoofing attack that involves a perpetrator modifying the domain-name-to-IP address mapping known as the Domain Name System (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a mobile code?

A

any software program designed to move from computer to computer to “infect” other applications by altering them in some way to include a version of the code. A virus is malicious mobile code, and a polymorphic virus is when the code mutates by changing its structure to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SQL injection?

A

an application attack in which an attacker injects malicious SQL code into existing SQL code on a company’s website to gain unauthorized access to a company’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is buffer overflow?

A

a type of cyberattack in which attackers overload a program’s buffer, the temporary storage, with more input than it is designed to hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a cover channel?

A

a storage channel used to transmit data outside of the security policy

17
Q

What is a distributed-denial-of-service attack (DDOS)?

A

multiple attackers or compromised devices are working in unison to flood an organization’s network, congesting it with large volumes of traffic that are greater than the bandwidth it was designed to handle

18
Q

What is the Visual, Agile, and Simple Threat (VAST) model?

A

the goal is to integrate threat management into a programming environment on a scalable basis; a threat modeling methodology

19
Q

What is ransomware?

A

an attack, typically malware, that locks a user or a company’s operating systems, applications, and ability to access data unless a ransom is paid

20
Q

What is business email compromise (BEC)?

A

often used to affect the flow of payments

21
Q

What is a watering hole attack?

A

fraudsters identify websites of suppliers, customers, or regulatory entities that are known to be used by several companies or even entire industries

22
Q

What are cloud malware injection attacks?

A

specific to cloud computing-based systems in which an attacker gains access to the cloud environment and then injects malware so that data can be stolen, services disrupted, or further access gained.

23
Q

What are escalated cyber attacks?

A

IoT devices, like smart refrigerators, are used as an attack base to infect more machines, or as an entry point for access into a connected network

24
Q

What is device spoofing?

A

attackers create an illegitimate or phony device and introduce it to a company’s network, posing as an actual device to gain information or access to that network

25
Q

What is location tracking?

A

a cybersecurity risk associated with mobile devices; involves a threat actor using GPS (Global Positioning System) technology to locate people, devices, or other assets.

26
Q

What are the threat modeling phases?

A

Identify assets, identify threats, perform reduction analysis, analyze the impact of an attack, develop countermeasures and controls, and review and evaluate

27
Q
A