MOD1: Intro to Ethical Hacking Flashcards

1
Q

Information accessed by those authorized to have access.

  1. Integrity
  2. Availability
  3. Non-repudiation
  4. Authenticity
  5. Confidentiality
A

Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trustworthiness of data and resources (ex. HASH).

  1. Integrity
  2. Availability
  3. Non-repudiation
  4. Authenticity
  5. Confidentiality
A

Integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information being genuine (ex. Digital Signatures)

  1. Integrity
  2. Availability
  3. Non-repudiation
  4. Authenticity
  5. Confidentiality
A

Authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information required for authorized users.

  1. Integrity
  2. Availability
  3. Non-repudiation
  4. Authenticity
  5. Confidentiality
A

Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Guarantee that the sender of the message cannot later deny having sent / received the message.

  1. Integrity
  2. Availability
  3. Non-repudiation
  4. Authenticity
  5. Confidentiality
A

Non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motive (goal) + Method + Vulnerability = ?

A

Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classification of attacks: List the 5 types of attacks.

A
  1. Passive attack
  2. Active attack
  3. Close-in attack
  4. Insider attack
  5. Distribution attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is passive attack?

A
Gaining information (reconnaissance) about the target without engaging with victim.
This is legal.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is active attack?

A
Gaining information (reconnaissance) about the target while actively communicating with the target system.
This is illegal.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Close-in attack?

A

Attacker is in close physical proximity basis with the systems/networks (ex. shoulder surfing, dumpster driving, eavesdropping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an insider attack?

A

Already inside the organization (ex. backdoors, malware, theft of physical devices). This can be a current employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a distribution attack?

A

Attackers tamper with hardware /software prior to installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the phases of the Cyber Kill Chain Methodology?

A

Reconnaissance –> Weaponization –> Deliver –> Exploitation –> Installation –> Command & Control –> Actions on Objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does TTPs stand for and what is it?

A

Tactics, Techniques, Procedures.
Tactics = the guidelines
Techniques = the “how”
Procedures = how organizations do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IoCs (Indicators of Compromise) can fall into these 4 categories:

A
  1. Email indicators
  2. Network indicators
  3. Host-based indicators
  4. Behaviour indicators
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

8 Types of Hacker classes.

A
  1. Black hat (aka crackers)
  2. White hat
  3. Gray hat
  4. Suicide hackers (don’t care if they get caught)
  5. Script kiddies
  6. Cyber Terrorists
  7. State-sponsored hackers (ex. Cozy Bear)
  8. Hacktivists (political agenda)
17
Q

5 Steps of Hacking.

  • know this for exam
A
  1. Recon (passive vs active)
  2. Scanning (ex. port scanners)
  3. Gaining Access
  4. Maintaining Access
  5. Clearing tracks (ex. remove log files)
18
Q

Ethical hacking = _________ + __________

A

Ethical hacking = permission + intent

19
Q

List some technical skills of a hacker.

A
  • knowledge of major OS environments
  • networking
  • expert
  • knowledgeable in security
  • “high technical” knowledge for launching sophisticated attacks
20
Q

List some non-technical skills of a hacker.

A
  • ability to learn quickly
  • strong work ethics
  • committed to organization’s security policies
  • awareness of standards and law
21
Q

What is information Assurance?

A

Assurance that the CIA + authenticity of information is protected during the usage, processing, storage, and transmission of information.

22
Q

What are the 5 steps in the risk management cycle?

A
  1. Risk Identification
  2. Risk Assessment
  3. Risk Treatment
  4. Risk Tracking
  5. Risk Review
23
Q

Role of AI and ML in cybersecurity?

A

AI/ML - mimicking decision making process and learning. Most of our security depends heavily on signature based detection.

24
Q

Standards and Laws:

PCI DSS

A

It’s a standard, not a law.

Payment Card Industry Data Security Standard

25
Q

Standards and Laws:

ISO/IEC 27001

A

ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission)

26
Q

Standards and Laws:

HIPAA

A

Health Insurance Portability and Accountability Act

27
Q

Standards and Laws:

SOX

A

Sarbanes-Oxley Act

28
Q

Standards and Laws:

DMCA

A

Defense Contract Management Agency

29
Q

Standards and Laws:

FISMA

A

Federal Information Security Management Act