Lesson 1: Comparing & Contrasting Attacks Flashcards

1
Q

information security

A

refers to protection of available information or information resources from unauthorized access, attack, theft, or data damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

primary goals or functions of information security

A
  • Prevention: personal information, company information, and information about intellectual property must be protected
  • Detection: detection occurs when a user is discovered trying to access unauthorized data or after information has been lost
  • Recovery: when there is a disaster or an intrusion by unauthorized users, system data can become compromised or damaged
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

assets

A
  • Tangible assets: these are physical items, such as buildings, furniture, computer equipment, software licenses, machinery, inventory (stock), and so on
  • Intangible assets: information resources, including IP, accounting information, plans and designs, and so on, can also include company’s reputation or brand
  • Employees: human capital
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data assets

A
  • Product development, production, fulfilment, and maintenance
  • Customer contact information
  • Financial operations and controls (collection and payments of debts, payroll, tax, financial reporting)
  • Legal obligations to maintain accurate records for a given period
  • Contractual obligations to third parties (Service Level Agreements)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad

A
  • Confidentiality: certain information should only be known to certain people
  • Integrity: data is stored and transferred as intended and that any modification is authorized
  • Availability: information is accessible to those authorized to view or modify it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

non-repudiation

A

subject cannot deny doing something, such as creating, modifying, or sending a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

steps in establishing a security policy

A
  1. Obtain genuine support for and commitment to such policy throughout organization
  2. Analyze risks to security within organization. Risks are components, processes, situations, or events that could cause loss, damage, destruction, or theft of data or materials
  3. Implement controls that detect and prevent losses and procedures that enable organization recover from losses (or other disasters) with minimum interruption to business continuity
  4. Review, test, and update procedures continually
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

information security roles and responsibilities

A
  1. Overall internal responsibility for security might be allocated to a dedicated department, run by a Director of Security or Chief Information Security Officer (CISO) | responsibility for security might have been allocated to an existing business unit, such as Information and Communications Technology (ICT) or accounting

2, Managers may have responsibility for a domain, such as building control, ICT, or accounting

  1. Technical and specialist staff have responsibility for implementing, maintaining, and monitoring policy (notable job roles are Information Systems Security Officer [ISSO] and Cybersecurity Analyst (CySA)
  2. Non-technical staff have responsibility of complying with policy and with any relevant legislation
  3. External responsibility for security (due care or liability) lies mainly with directors or owners, though again, it is important to note that all employees share some measure of responsibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

information security competencies

A
  1. Participate in risk assessments and testing of security systems and make recommendations
  2. Specify, source, install, and configure secure devices and software
  3. Set up and maintain document access control and user privilege profiles
  4. Monitor audit logs, review user privileges, and document access controls
  5. Manage security-related incident response and reporting
  6. Create and test business continuity and disaster recovery plans and procedures
  7. Participate in security training and education programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

vulnerability

A
  • weakness that could be triggered accidentally or exploited intentionally to cause a security breach
  • ex:
  • Improperly configured or installed hardware or software
  • Delays in applying and testing software and firmware patches
  • Untested software and firmware patches
  • Misuse of software or communication protocols
  • Poorly designed network architecture
  • Inadequate physical security
  • Insecure password usage
  • Design flaws in software or operating systems, such as unchecked user input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat

A

potential for a threat agent or threat actor (something or someone that may trigger a vulnerability accidentally or exploit it intentionally) to “exercise” a vulnerability (that is, to breach security). Path or tool used by threat actor can be referred to as threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

risk

A

likelihood and impact (or consequence) of a threat actor exercising a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

control

A

system or procedure put in place to mitigate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attributes of threat actors

A
  • Viruses
  • Rootkits
  • Trojans
  • Botnets
  • DDoS
  • Specific software vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Script Kiddies, Hackers, and Hacktivists

A
  • Hacker and attacker are related terms for individuals who have skills to gain access to computer systems through unauthorized or unapproved means
  • Black Hat or cracker: malicious
  • White Hat: non-malicious
  • Script kiddie: someone that uses hacker tools without necessarily understanding how they work or having ability to craft new attacks
  • Newbie (n00b): bare minimum of experience and expertise
  • Hacktivist: groups using cyber weapons to promote political agenda | might attempt to obtain and release confidential information to public domain, perform Denial of Service (DoS) attacks, or deface websites
  • Anonymous
  • WikiLeaks
  • LulzSec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organized Crime and Competitors

A
  • Organized crime will seek any opportunity for criminal profit, but typical activities are financial fraud (both against individuals and companies) and blackmail
  • Most competitor-driven espionage is thought to be pursued by nation-state backed groups, but it is not inconceivable that a rogue business might user cyber espionage against its competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Nation State Actors/Advanced Persistent Threats

A
  • Nation states have developed cybersecurity expertise and will use cyber weapons to achieve both military and commercial goals
  • Advanced Persistent Threat (APT): to understand behavior underpinning modern types of cyber adversaries | ongoing ability of an adversary to compromise network security (to obtain and maintain access) using a variety of tools and techniques
  • Nation state actors have been implicated in many attacks, particularly on energy and health network systems
  • Goals include espionage, strategic advantage, commercial gain (like North Korea)
  • Nation state actors will work at arm’s length from state sponsoring and protecting them, maintaining “plausible deniability,” likely to pose as independent groups or even as hactivists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malicious Insider Threats

A
  • Perpetrator of an attack is a member of, ex-member of, or somehow affiliated with organization’s own staff, partners, or contractors
  • Computer Emergency Response Team (CERT) definition of malicious insider
  • Current or former employee, contractor, or business partner who has or had authorized access to an organization’s network, system, or data and intentionally exceeded or misused that access in manner that negatively affected the confidentiality, integrity, or availability of organization’s information or informations systems
  • CERT identifies main motivators for insider threats
  • Sabotage
  • Financial gain
  • Business advantage
  • Implementing operation and management controls (especially secure logging and auditing) is essential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Kill Chain

A
  • several models for describing general process of an attack on systems security (following influential paper Intelligence-Driven Computer Network Defense)
  • Planning/scoping: attacker determines what methods s/he will use to complete phases of attack
  • Reconnaissance/discovery: attacker discovers what s/he can about how target is organized and what security systems it has in place
  • Weaponization: phase attacker utilizes an exploit to gain access | comprised of several steps
  • Exploit: run code on target system to exploit a vulnerability and gain elevated privileges. Point of access (a compromised computer or user account, for instance) referred to as pivot point
  • Callback: establish covert channel to an external Command and Control (C2 or C&C) network operated by attacker
  • Tool download: install additional tools to pivot to maintain covert access to system and progress attack
  • Post-exploitation/lateral discovery/spread: if attacker obtains pivot point, next phase is typically to perform more privileged assets of interest
  • Action on objectives: attacker typically uses access s/he has achieved to covertly copy information from target systems (data exfiltration). However, an attacker may have other motives or goals to achieve
  • Retreat: once attacker has achieved his or her initial aims without being detected, s/he may either maintain an APT or seek to withdraw from network, removing any trace of his or her presence to frustrate any subsequent attempt to identify source of attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Indicator

A

pattern of observables that are “of interest”; or worth of cybersecurity analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Incident

A

pattern of indicators form a discrete cybersecurity event. Incident is defined both by indicators involved and assets affected. Incident will be assigned a ticket and priority, and parties involved in response and incident handling will be identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tactics, techniques, and procedures (TTP)

A

known adversary behaviors, starting with overall goal and asset target (tactic), and elaborated over specific techniques and procedures. This information is used to identify potential indicators and incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Campaign and Threat Actors

A

adversaries launching cyber-attacks. Actions of Threat Actors utilize multiple TTPs against same target or same TTP against multiple targets may be characterized as a campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Exploit Target

A

system vulnerabilities or weaknesses deriving from software faults or configuration errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Course of Action (CoA)

A

mitigating actions or use of security controls to reduce risk from Exploit Targets or to resolve an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Passive reconnaissance

A

attacker can “cyber-stalk” his or her victims to discover information

27
Q

Open Source Intelligence (OSINT)

A

publicly available information and tools for aggregating and searching

28
Q

Deep web

A

any part of World Wide Web that is not indexed by search engine

29
Q

Dark net

A

network established as an overlay to Internet infrastructure by software, such as The Onion Router (TOR), Freenet, or I2P, that acts to anonymize usage and prevent a third party from knowing about existence of network or analyzing any activity taking place over network. Onion routing, for instance, uses multiple layers of encryption and relays between nodes to achieve this anonymity

30
Q

Dark web

A

sites, content, and services accessible only over a dark net

31
Q

Bitcoin currency

A

exploited as a means of extracting funds from victims without revealing threat actor’s identity

32
Q

Threat Intelligence Resources

A
  • Alien Vault https://www.alienvault.com/solutions/threat-intelligence
  • SecureWorks https://www.secureworks.com/capabilities/counter-threat-unit
  • FireEye https://www.fireeye.com/solutions/cyber-threat-intelligence-subscriptions.html
  • Symantec
    http: //symantec.com/security-intelligence
  • Microsoft
    https: //www.microsoft.com/en-us/wdsi
  • DarkReading
    https: //www.darkreading.com
  • SANS
    https: //www.sans.org/newsletters
33
Q

Social Engineering

A

“Hacking the human” refers to means of getting users to reveal confidential information

34
Q

Impersonation

A
  • Pretending to be someone else is one of the basic social engineering techniques
  • Familiarity/Liking
  • natural charisma
  • Consensus/Social Proof
  • Refers to the fact that without an explicit instruction to behave in certain way, many people will act just as they think others would act | Tailgating | for example, an attacker may be able to fool a user into believing that a malicious website is actually legitimate by posting numerous fake reviews and testimonials praising site
  • Authority and Intimidation
  • Many people find it difficult to refuse a request by someone they perceive as superior in rank or expertise
  • Scarcity and Urgency
  • Often deployed by salespeople, creating a false sense of scarcity or urgency can disturb people’s ordinary decision-making process | “limited time” or “invitation-only”
35
Q

Dumpster diving

A

refers to combing through an organization’s (or individual’s) garbage to try to find useful documents (or even files stored on discarded removable media)

36
Q

Shoulder surfing

A

refers to stealing a password or PIN (or other secure information) by watching user type it | use of high-powered binoculars or CCTV to directly observe target remotely

37
Q

Lunchtime attack

A

user leaves a workstation unattended while logged on, an attacker can physically gain access to system

38
Q

Tailgating

A

entering a secure area without authorization by following close behind person that has been allowed to open door or checkpoint | piggy backing

39
Q

Phishing

A

combination of social engineering and spoofing (disguising one computer resource as another)

40
Q

Spear phishing

A
  • phishing scam where attacker has some information that makes an individual target more likely to be fooled by attack
  • Spear phishing attack directed specifically against upper levels of management in organization (CEOs and other “big beasts”) is sometimes called whaling
41
Q

Vishing

A

phishing attack conducted through voice channel (telephone or VoIP, for instance)

42
Q

SMishing

A

fraudulent SMS texts

43
Q

Pharming

A

redirects users from a legitimate website to a malicious one

44
Q

Watering hole attack

A

relies on circumstance that group of targets may use an unsecure third-party website

45
Q

Hoaxes

A

security alerts or chain emails

46
Q

Malicious code

A

undesired or unauthorized software, or malware, that is placed into a target to disrupt operations or to redirect system resources for attacker’s benefit

47
Q

Boot sector viruses

A

attack disk boot sector information, partition table, and sometimes file system

48
Q

Program viruses

A

sequences of code that insert themselves into another executable program. When application is executed, virus code becomes active. Executable objects can also be embedded or attached within other file types, such as document formats like Microsoft Word (DOC), Portable Document Format (PDF), and Rich Text Format (RTF)

49
Q

Script viruses

A

scripts are powerful languages used to automate OS functions and add interactivity to web pages. Scripts are executed by an interpreter rather than self-executing. Most script viruses target vulnerabilities in interpreter. Note that some document types, such as PDF, support scripting and have become common vector

50
Q

Macro viruses

A

uses programming features available in Microsoft Office documents. Recent versions of Office enforce restrictions against enabling potentially dangerous content by default, but some users may have disabled these protections

51
Q

Multipartite viruses

A

use both boot sector and executable file infection methods of propagation

52
Q

type of viruses have in common is that they must infect a host file

A
  • Disk
  • Network
  • Email attachment
  • IM attachment
53
Q

Payload

A
  • perform any action available to host process
  • ex:
  • a boot sector virus might be able to overwrite existing boot sector, an application might be able to delete, corrupt, or install files, and a script might be able to change system settings or delete or install files
54
Q

Computer Worms

A

Memory-resident viruses that replicate over network resources | worm is self-contained; that is, it does not need to attach itself to another executable file | worms typically target some sort of vulnerability in an application, such as a database server or web browser. Primary effect of worm infestation is to rapidly consume network bandwidth as worm replicates. May be able to crash an operating system or server application (performing a Denial of Service attack). Like viruses, worms can also carry a payload that may perform some other malicious action, such as installing a backdoor

55
Q

Trojan horse malware

A
  • malware code concealed within an application package that the user thinks is benign, such as a game or screensaver | purpose not to replicate, but either to cause damage to a system or to give an attacker a platform for monitoring and/or controlling a system
  • Rogueware or scareware
  • fake anti-virus, where a web pop-up claims to have detected viruses on computer and prompts user to initiate full scan, which installs attacker’s Trojan
56
Q

Remote Access (or Administration) Trojan (RAT)

A
  • function as backdoor applications | mimics functionality of legitimate remote control programs, but are designed specifically for stealth installation and operation
  • Allows attacker to access PC, upload files, and install software on it
  • Could allow attacker to use computer in botnet, to launch Distributed Denial of Service (DDoS) attacks, or mass-mail spam
  • Attacker must establish some means of secretly communicating with compromised machine (covert channel)
  • Command and Control (C2 or C&C)
57
Q

Spyware

A
  • program that monitors user activity and sends information to someone else
  • May also be able to take screenshots or activate recording devices, such as microphone or webcam
58
Q

Keyloggers

A

actively attempt to steal confidential information; for example, as a user enters a credit card number into a webform, it records keystrokes, thereby capturing credit card number

  • ex
  • KeyGhost hardware to perform keylogging
    KeyGrabber hardware to perform keylogging
  • KeyGhost hardware to perform keylogging
    KeyGrabber hardware to perform keylogging
59
Q

Adware

A

type of software or browser plug-in that displays commercial offers and deals

60
Q

Rootkits

A
  • Many Trojans cannot conceal their presence entirely and will show up as a running process or service
  • Represents a class of backdoor malware that is harder to detect and remove
  • Rootkits work by changing core system files and programming interfaces
  • Contain tools for cleaning system logs, further concealing presence of rootkit
  • Most powerful rootkit operate in kernel mode, infecting a machine through a corrupted device driver or kernel patch
  • Rootkits can reside in firmware (either computer firmware or firmware of any sort of adapter card, hard drive, removable drive, or peripheral device)
61
Q

Ransomware

A
  • type of Trojan malware that tries to extort money from victim
  • uses payment methods, such as wire transfer, bitcoin, or premium rate phone lines to allow attacker to extort money without revealing his or her identity or being traced by local law enforcement
62
Q

Crypto-malware

A

class of ransomware attempts to encrypt data files on any fixed, removable, and network drives | if attack is successful, user will be unable to access files without obtaining private encryption key, which is held by attacker

63
Q

Logic bomb

A

type of malware that is not triggered automatically | they wait for a preconfigured time or date (time bomb) | logic bombs also need not to be malware code | scripted trap that runs in event his or her account is deleted or disabled. Anti-virus software is unlikely to detect this kind of malicious script or program; this is referred to as a mine