Leonardo Aniello Flashcards

1
Q

What are the three objectives for information and information systems?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is contained in the model of Computer Security?

A
  • Asset
  • Hardware
  • Software
  • Data
  • Communication facilities and networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are types of asset vulenerabilities?

A
  • Corrupted systems
  • Leaky systems
  • Unavailable or very slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Active Attack?

A

An attempt to alter assets or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a passive attack?

A

An attempt to learn or make use of information from the system that does not affect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an inside attack?

A

Initiated by an entity inside the security perimeter. The insider is authorised to access system resources but uses them in a malicious way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an outside attack?

A

Initiated from outside the perimeter. by an unauthorised or illegitimate user of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Risk?

A

A measure of the extent to which an asset is threatened by a potential circumstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of countermeasures to deal with a security threat/attack?

A
  • Detection
  • Prevention
  • Mitigation
  • Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are cybercriminals interested in/

A

Illegal profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the typical attacks of cybercriminals?

A
  • Money theft
  • Personal document ransom
  • Data breaches
  • Distributed Denial of Service (DDos)
  • Cryptojacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are cybercriminals attack vectors? (How they attack)

A
  • Malware
  • Social Engineering/Email
  • Social media
  • Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Nation States interested in?

A
  • High quality Intelligence
  • Sabotage activities/crucial infrastructures
  • Subversion e.g. political election
  • Generally, engage in cyberwarfare activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the typical attacks of Nation States?

A
  • Influence campaigns
  • Data breaches
  • DDoS
  • Advanced Persistence Threats (APT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the attack vectors of Nation States?

A

Same as Cybercriminals but more advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cyberwarfare?

A

It refers to the activity of fighting a cyberwar, often including the weapons and methods that are used in the cyber space

17
Q

Why is cyberwarfare attractive?

A
  • Cost effectiveness, speed of light (almost)
  • No causalities but can disrupt adversary
  • Hard to detect and neutralize for the victim
  • Exploitable vulnerabilities increase with technological evolution
  • Anonymity
  • Plausible deniability
  • Cyber Deterrence
18
Q

What is Advanced Persistent Threat (APT)?

A

A long-term pattern of targeted, sophisticated attacks

19
Q

What are Hacktivists motivated by?

A

Political, religious, social ideologies

20
Q

What are the typical attacks of Hacktivists?

A
  • Web defacements
  • Data breaches
  • DDoS
21
Q

What are the attack vectors of Hacktivists?

A

Same as Cybercriminals, but generally less advanced

22
Q

What principles of hackers’ ethics do Hacktivists share?

A
  • Libertarian and anarchist in nature
  • Conceptualised as opponents of the power elite, that use technology to promote their own agendas
  • Act of civil disobedience
23
Q

What is the culture of Hacktivists?

A
  • Conspiracy theorising
  • Obsession with privacy and secrecy
  • Membership fluidity
  • Culture of humour and creativity
24
Q

What are Insider Threats?

A

They are people with legitimate access to valuable resources that commit intentional attacks e.g. disgruntled employees

25
What are the different types of insider threats?
- Publish information on the web - Install a malware - Steal and sell information
26
What is Cyber-attack Life Cycle Models?
Empirical models representing the sequence of steps that cyber attacks go through
27
What is Lockheed Martin's Kill Chain Model?
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives
28
What is the Reconnaissance stage of the Kill Chain Model?
- Target research and selection - What information did attackers gather? How?
29
What is the Weaponization stage of the Kill Chain Model?
- Development of required cyber weapons - What cyber weapons have been used? How did the attacks obtain them?
30
What is the Delivery stage of the Kill Chain Model?
- Delivery of the payload to the target - How did the attackers deliver the cyber weapon(s) to the intended target - What was delivered, from where, to where and how?
31
What is the Exploitation stage of the Kill Chain Model?
- Execution of the payload e.g. through the exploit - How were cyber weapons activated?
32
What is the Installation stage of the Kill Chain Model?
- Ensure payload persistence within the target - How did the attackers gain persistence inside the target
33
What is the Command & Control stage of the Kill Chain Model?
- Establish a communication channel with an external command and control (C2) server - How did the attacks establish a communication channel to control the cyber weapons installed inside the target
34
What is the Actions on Objectives stage of the Kill Chain Model?
- Execution of desired actions within the target, based on commands from C2 - What did the attackers do to achieve their goals?
35