Lesson 3 Flashcards
this is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime
forensic analysis
refers to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems attacked
forensic analysis in the context of cybersecurity
this aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker
forensic analysis
explain forensic analysis in your own words
practices where governments or governmental organizations perform surveillance and data collection at a national state
mass dataveillance
performs surveillance and data collection on an individual of interest
personal dataveillance
attacks against information systems through malware; the attacks can target the hardware, the network, the system, the applications, or the user themselves (social engineering, phishing); attacker can be an insider or outsider
intrusion attacks
observation attacks, perturbation attacks, and hardware-targeted software attacks are classified as
physical attacks
these are physical attacks based on the observation of the circuit behavior during a computation
side-channel analysis (sca) or observation attacks
attacks where a device undergoes modification of physical parameters in order to obtain an incorrect behavior
fault attacks (i.e. power glitches, clock glitches, laser pulses, and electromagnetic pulses)
an example of this is the rowhammer attack, flipping memory bits while reading and writing another cell; effective on SSD disks
hardware-targeted software attacks
this refers to finding a path for each packet sent on the internet, no matter its source and its destination; this can isolate a whole country or redirect all traffic through a surveillance point
routing
a hierarchical decentralized naming system for the internet, with scalability and flexibility as key design goals; used for address resolution
Domain name system (DNS)
the server cannot handle the load and thus does not respond to legitimate queries
Denial of Service (DOS)
IP datagram are also known as
packets
what are the two types of routing protocols
- autonomous systems for single organization and interconnection level (internet backbone level)
- border gateway protocol (bgp)
this is the protocol currently in use on the internet for the exchange of routing and reachability information among autonomous systems
Border Gateway Protocol
Peeking is irresistible. If there is information visible in the packet, there is no way to keep an intermediate node from looking at it. So the ultimate defense of the end to end mode is
end-to-end encryption
advanced and leveraging higher social intelligence to make people confident in the legitimacy of the request they received
spear fishing
who are the weakest link in the security chain
users who are unaware of security issues and therefore easily deceived by simple attacks
this aims at convincing the user to perform an action/provide sensitive information by gaining their trust
social engineering
emotions, memory, or beliefs are referred to as
cognitive biases
why is the education and awareness of good practice and cyber hygiene strategy of every computer user crucial
possible answers:
- avoid fake news
- mitigating cyber threats
this is a complex assembly of an extremely large number of
devices, from user machines or devices to routers, linked by a huge array of
wireless and wired networking technologies.
internet