Module 02 - Threats, Vulnerabilities, and Mitigations Flashcards

1
Q

What are the attack types?

A

Opportunistic and unstructured
Targeted and structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s shadow IT?

A

Is the use of unapproved or unsanctioned technology in a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the attributes of threat actors? Define the attributes

A

Internal/External => Degree of access of the actor
Sophistication/Capability => Ability to attack
Resources/Funding => Support to the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the general strategies of threat actors?

A
  1. Service disruption
  2. Data exfiltration
  3. Disinformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the motivations of threat actors?

A
  1. Chaotic motivation
  2. Financial motivation
  3. Political motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of attack could be done when there’s a financial motivation?

A
  1. Blackmail
  2. Extortion
  3. Fraud
  4. Commercial espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between Blackmail and Extortion?

A

Blackmail is when trying to prevent the release of confidential information.
Extortion is trying to prevent some type of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the threat actor types?

A
  1. Hackers
  2. Unskilled hackers [Script Kiddie]
  3. Hacker groups [Hacktivists]
  4. Nation-state actors [APT]
  5. Organized crime
  6. Internal [Whitleblower]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronym:
APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a whistleblower?

A

Internal threat actor with an political motivation to release confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps of an attack?

A
  1. Reconnaissance
  2. Social Engineering
  3. Technical approaches
  4. Breach the system
  5. Escalate privilege
  6. Backdoor
  7. Stage computers
  8. Exploit vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s reconnaissance?

A

The process of gathering information about an organization, its users, hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s Social Engineering?

A

The process of manipulating others into providing sensitive information or doing unauthorized procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s to stage computers?

A

The process of preparing computers to perform additional tasks in the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List:
Defense security concepts

A
  1. Layering [Defense in depth]
  2. Principle of least privilege
  3. Variety
  4. Randomness
  5. Simplicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the concept of layering (Defense in depth)

A

It’s the implementation of multiple security strategies to protect the same asset.

If one is bypassed, there’s multiple others to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define the concept of Variety

A

It’s the variety of methods in defensive layers, for the multiple use of the same method isn’t secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define the concept of ‘Principle of least privilege’

A

Users have only the access they need to do their jobs and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define the concept of ‘Radomness’

A

Constant change in personal habits, passwords, in order do prevent predictability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s an attack surface?

A

Potential vector for attempting an intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can vulnerabilities be exploited?

A

Remote and local.

Remote are exploited unauthenticated
Local are exploited with valid credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s a secure network?

A

Identifies, authenticate, authorize and audit network users, hosts and traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s a threat vector?

A

A path an attacker might use to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the difference between threat vector and attack vector?

A

Threat vector is the potential path of an attack.
Attack vector is the path used in a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the attack vector types?

A
  1. Vulnerable software
  2. Network vector
  3. Lure-based vector
  4. Message-based vectors
  5. Supply chain
  6. Human vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the network vectors?

A
  1. Direct access (physical)
  2. Wired network
  3. Remote network
  4. Cloud access
  5. Bluetooth network
  6. Default credentials
  7. Open service ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the ‘Cloud access’ network vector?

A

The compromise of an administrative cloud account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the ‘Direct access’ network vector?

A

It’s the compromise the physical place where network devices are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the ‘Wired network’ network vector?

A

The attaching of unauthorized devices to the physical network, with permitted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the ‘Open service port’ network vector?

A

Being able to establish a unauthenticated connection in a TCP, or UDP, port

21
Q

What are lure-based vectors?

A

Are vectors that are attractive and fools users to go for it

21
Q

What’s a drop attack?

A

Threat actor leaves infected USB sticks on the floor, waiting one employee to plug it into a computer, initiating an attack

22
Q

What are message-based vectors?

A

The sending of infected files within messages that tricks users into opening.
[Phising]

23
Q

What’s the attack surface of message based vectors?

A
  1. Email
  2. Short Message Service - SMS
  3. Instant Messaging - IM
  4. Web and social media
23
Q

What’a zero-click exploit?

A

It’s an exploit triggered by no user action.

24
Q

What’s a supply chain?

A

End-to-end process of designing, manufacturing and distributing goods or services to customers

25
Q

What’s a ‘procurement management’ process?

A

The process of ensuring reliable sources are in the supply chain

26
Q

What’s social engineering?

A

Means of extracting information or to perform actions through the human factor.

27
Q

What are the manipulation techniques?

A
  1. Moral obligation
  2. Innate human trust
  3. Threatening
  4. Very little to nothing
  5. Ignorance
  6. Authority and fear
  7. Social proof
  8. Scarcity
  9. Likeability
  10. Urgency
  11. Common ground
28
Q

What is the social engineering process?

A
  1. Research
  2. Development
    2.1 Selecting individuals
    2.2 Relating to the targets
  3. Exploitation
29
Q

What’s footprinting?

A

The process of extracting information on any resource available

30
Q

What are the social engineering techniques?

A
  1. Impersonation and pretexting
  2. Phishing and pharming
  3. Typosquatting
  4. Brand impersonation and disinformation
31
Q

What’s a business email compromise?

A

It’s a sophisticated phishing attack where a valid account of vendor are spoofed or compromised.

32
Q

What’s the difference between disinformation and misinformation?

A

Disinformation is when the purpose is to deceive.

Misinformation is repeating false information without the intent to deceive.

33
Q

What’s a watering hole attack?

A

The compromise of a third-party resource used by the target’s system or by it’s employees.

(Supply chain attack)

34
Q

What’s a malware?

A

Software that does “bad things” in the system from the owner’s perspective

35
Q

What are the types of malware?

A
  1. Virus and worms
  2. Trojans
  3. PUP/PUA
36
Q

What’s a virus?

A

It’s a type of malware designed to replicate and spread from computer to computer, executed only when a user performs an action

37
Q

What are the types of viruses?

A
  1. Non-resident
  2. Memory resident
  3. Boot
  4. Script and macro
  5. Fileless
38
Q

What’s a polymorphic virus?

A

Virus that dynamically change, or obfuscate, their code to evade detection

39
Q

What’s a multipartite virus?

A

Viruses that use multiple vectors

40
Q

What’s a worm?

A

Virus that replicates and runs withou user intervention

41
Q

Acronym:
AVT

A

Advanced Volatile Threat

42
Q

What’s a AVT or APT virus kind?

A

It’s a fileless and live-off-the-land malware.

43
Q

What’s a spyware?

A

Malware that spies on the target’s system

44
Q

What are the most common spyware kinds of virus?

A
  1. Adware
  2. Keylogger
  3. Tracking cookies
  4. Supercookies
  5. Beacons
45
Q

What’s a supercookie [Spyware]?

A

It’s the storing of tracking data without declaring or through header requests

46
Q

What are beacons [Spyware]?

A

Single-pixel image embedded into a site; When loaded, footprints, collects metadata and could even run scripts

47
Q

What’s a backdoor?

A

Access method that circumvents the usual authentication method.

48
Q

Acronym:
RAT

A

Remote Access Trojan

49
Q

What’s a RAT - Remote Access Trojan?

A

Backdoor malware that pretends to be a legitimate program

50
Q

What’s a zombie? In the context of RATs

A

A host controlled by a RAT

51
Q

What’s a botnet?

A

A group of computers under the control of the same malware instance.

52
Q

Acronym:
What C2 or C&C?

A

Command and Control

53
Q

What’s a Command and Control

A

Infrastructure of hosts and services where attacker distributes, direct and controls malwares over botnets

54
Q

What are the commonly used protocols in C2?

A

IRC, HTTP and DNS

55
Q

Acronym:
IRC [Protocol]

A

Internet Relay Chat

56
Q

What’s a rootkit?

A

Malware that runs with highest privilege on a system

57
Q

What’s a ransomware?

A

Extorts money from victims by making devices, or data, unavailable and demanding payment.

58
Q

What’s crypto-ransomware?

A

Ransomware that encrypts the data, the private encryption key is held by the attacker

59
Q

What’s a cryptojacking malware?

A

Steals physical resources to mine cryptocurrency.

60
Q

What’s a logic bomb?

A

Malicious code that waits a trigger to be executed.

61
Q

What are good strategies in malware prevention?

A
  1. Patches
  2. Anti-malware soluctions
  3. Browser settings
  4. Firewall
  5. Training
  6. Web filter