Lesson 3 Flashcards
this is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime
forensic analysis
refers to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems attacked
forensic analysis in the context of cybersecurity
this aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker
forensic analysis
explain forensic analysis in your own words
practices where governments or governmental organizations perform surveillance and data collection at a national state
mass dataveillance
performs surveillance and data collection on an individual of interest
personal dataveillance
attacks against information systems through malware; the attacks can target the hardware, the network, the system, the applications, or the user themselves (social engineering, phishing); attacker can be an insider or outsider
intrusion attacks
observation attacks, perturbation attacks, and hardware-targeted software attacks are classified as
physical attacks
these are physical attacks based on the observation of the circuit behavior during a computation
side-channel analysis (sca) or observation attacks
attacks where a device undergoes modification of physical parameters in order to obtain an incorrect behavior
fault attacks (i.e. power glitches, clock glitches, laser pulses, and electromagnetic pulses)
an example of this is the rowhammer attack, flipping memory bits while reading and writing another cell; effective on SSD disks
hardware-targeted software attacks
this refers to finding a path for each packet sent on the internet, no matter its source and its destination; this can isolate a whole country or redirect all traffic through a surveillance point
routing
a hierarchical decentralized naming system for the internet, with scalability and flexibility as key design goals; used for address resolution
Domain name system (DNS)
the server cannot handle the load and thus does not respond to legitimate queries
Denial of Service (DOS)
IP datagram are also known as
packets