Leonardo Aniello Flashcards
What are the three objectives for information and information systems?
- Confidentiality
- Integrity
- Availability
What is contained in the model of Computer Security?
- Asset
- Hardware
- Software
- Data
- Communication facilities and networks
What are types of asset vulenerabilities?
- Corrupted systems
- Leaky systems
- Unavailable or very slow
What is an Active Attack?
An attempt to alter assets or affect their operation
What is a passive attack?
An attempt to learn or make use of information from the system that does not affect assets
What is an inside attack?
Initiated by an entity inside the security perimeter. The insider is authorised to access system resources but uses them in a malicious way
What is an outside attack?
Initiated from outside the perimeter. by an unauthorised or illegitimate user of the system
What is a Risk?
A measure of the extent to which an asset is threatened by a potential circumstance
What are the types of countermeasures to deal with a security threat/attack?
- Detection
- Prevention
- Mitigation
- Recovery
What are cybercriminals interested in/
Illegal profits
What are the typical attacks of cybercriminals?
- Money theft
- Personal document ransom
- Data breaches
- Distributed Denial of Service (DDos)
- Cryptojacking
What are cybercriminals attack vectors? (How they attack)
- Malware
- Social Engineering/Email
- Social media
- Botnet
What are Nation States interested in?
- High quality Intelligence
- Sabotage activities/crucial infrastructures
- Subversion e.g. political election
- Generally, engage in cyberwarfare activities
What are the typical attacks of Nation States?
- Influence campaigns
- Data breaches
- DDoS
- Advanced Persistence Threats (APT)
What are the attack vectors of Nation States?
Same as Cybercriminals but more advanced
What is Cyberwarfare?
It refers to the activity of fighting a cyberwar, often including the weapons and methods that are used in the cyber space
Why is cyberwarfare attractive?
- Cost effectiveness, speed of light (almost)
- No causalities but can disrupt adversary
- Hard to detect and neutralize for the victim
- Exploitable vulnerabilities increase with technological evolution
- Anonymity
- Plausible deniability
- Cyber Deterrence
What is Advanced Persistent Threat (APT)?
A long-term pattern of targeted, sophisticated attacks
What are Hacktivists motivated by?
Political, religious, social ideologies
What are the typical attacks of Hacktivists?
- Web defacements
- Data breaches
- DDoS
What are the attack vectors of Hacktivists?
Same as Cybercriminals, but generally less advanced
What principles of hackers’ ethics do Hacktivists share?
- Libertarian and anarchist in nature
- Conceptualised as opponents of the power elite, that use technology to promote their own agendas
- Act of civil disobedience
What is the culture of Hacktivists?
- Conspiracy theorising
- Obsession with privacy and secrecy
- Membership fluidity
- Culture of humour and creativity
What are Insider Threats?
They are people with legitimate access to valuable resources that commit intentional attacks e.g. disgruntled employees