lecture 1 part 2 Flashcards

1
Q

steps of cyber kill chain

A

1) reconnaissance - target identification , identify weakness
2) Weaponization- intruder creates remote access malware weapon tailored to weakness
3) Delivery- intruder transmits weapon to target
4) Exploitation- malware weapons program code triggers
5) installation- malware weapon installs access point (backdoor) usable by intruder
6) command and control- malware enables intruder to have “hands on the keyboard” persistent access to target network
7) actions on objective - intruder takes action to achieve their goals eg data extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

green padlock and misconceptions

A

system using cryptography and trusted third parties to exchange encryption keys to encrypt network traffic

misconception- makes all website use secure

issues - different certificates with different levels of authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly