MOD1: Intro to Ethical Hacking Flashcards
Information accessed by those authorized to have access.
- Integrity
- Availability
- Non-repudiation
- Authenticity
- Confidentiality
Confidentiality.
Trustworthiness of data and resources (ex. HASH).
- Integrity
- Availability
- Non-repudiation
- Authenticity
- Confidentiality
Integrity.
Information being genuine (ex. Digital Signatures)
- Integrity
- Availability
- Non-repudiation
- Authenticity
- Confidentiality
Authenticity.
Information required for authorized users.
- Integrity
- Availability
- Non-repudiation
- Authenticity
- Confidentiality
Availability.
Guarantee that the sender of the message cannot later deny having sent / received the message.
- Integrity
- Availability
- Non-repudiation
- Authenticity
- Confidentiality
Non-repudiation.
Motive (goal) + Method + Vulnerability = ?
Attacks.
Classification of attacks: List the 5 types of attacks.
- Passive attack
- Active attack
- Close-in attack
- Insider attack
- Distribution attack
What is passive attack?
Gaining information (reconnaissance) about the target without engaging with victim. This is legal.
What is active attack?
Gaining information (reconnaissance) about the target while actively communicating with the target system. This is illegal.
What is Close-in attack?
Attacker is in close physical proximity basis with the systems/networks (ex. shoulder surfing, dumpster driving, eavesdropping)
What is an insider attack?
Already inside the organization (ex. backdoors, malware, theft of physical devices). This can be a current employee.
What is a distribution attack?
Attackers tamper with hardware /software prior to installation.
What are the phases of the Cyber Kill Chain Methodology?
Reconnaissance –> Weaponization –> Deliver –> Exploitation –> Installation –> Command & Control –> Actions on Objectives.
What does TTPs stand for and what is it?
Tactics, Techniques, Procedures.
Tactics = the guidelines
Techniques = the “how”
Procedures = how organizations do
IoCs (Indicators of Compromise) can fall into these 4 categories:
- Email indicators
- Network indicators
- Host-based indicators
- Behaviour indicators