Misc Flashcards
CIAAN: C?
Confidentiality, only authorized users
CIAAN: I?
Integrity, the message is not manipulated, unchanged, no MITM
CIAAN: AA?
Availability: If the message is not available, it can’t be read.
EX. servers need to be up.
Authenticity: A genuine message.
CIAAN: N?
Non-repudiation: The sent message can’t be denied at a later stage.
Hacker role: Red Team?
Attackers
Hacker role: Blue Team?
Defenders
Hacker role: Purple team?
A mix of attackers and defenders
Name 2 attack types?
Targeted attack / planned attack
Opportunistic attack
What is a supply chain attack?
Attack on a customer to a customer to reach the final goal.
Domino effect hack
Hacker value?
Political power, money, information
Digital warfare?
Espionage, vote manipulation, behaviour modification of people online, spreading misinformation, attack infrastructure
Defense in depth?
Holistic security. Secure the least secure first then moving to the next least secure and so on.
Zero trust?
Minimize security holes though thinking that everything is unsecure. EX. Do not give access levels to those who do not explicitly needed.
Triangle of security?
Security, Function and user experience. The sweet spot is very situational.
Ethics and moral?
Thou shall only do: What is legal. What you have permission to do. With a good cause. Without destroying anything.
Responsible disclosure?
In case of a found vulnerability, please disclose responsibly! Make public no less than 90 days later. In the meantime, inform the affected party.
Risks and the weakest link?
List three things.
Many risks and vulnerabilities shouldn’t exist and is easily avoidable.
Humans are always the weakest link.
Education of staff is important.
Risk equation?
Risk = (Threat x Vulnerability) x Consequence
Probability
What is defined as a Risk?
The possibility of hurting consequences.
Threat?
The planning of executing drastic measures or violence.
What is a vulnerability?
Something that exposes a system to attack.
Risk management options?
Avoid
Minimize
Move the responsibility
Accept
Imagined threats vs factual threats?
Both is relevant. Related to safety, knowledge, staff education.
Hacker philosophy?
Use a hacker’s mindset (Attacker viewpoint)
What is important regarding risk management?
List 4 things.
- Define risks in an organization
Identify business critical risks - Brainstorm all risk scenarios, also the “impossible”, then prioritize them.
- Involve every relevant staff
- Risk analysis is not a one-time thing. It’s an ongoing process.
Risk analysis quotes?
“It is better to remove a risk from the list than finding it when it is too late”
“Take decisions based on facts, instead of assumptions”
“Look beyond company policies and procedures, Hackers will do exactly that!”
Policy for hackers?
Be mindful of explaining risks to decisionmakers.
If we don’t follow policies, risks emerges.
What is the steps of a regular pentest?
5 steps.
- Recon & footprinting
- Scanning & enumeration
- Gaining access / run exploit
- Maintaining access / install backdoor
- Covering steps / manipulate logs