Module 02 - Threats, Vulnerabilities, and Mitigations Flashcards
What are the attack types?
Opportunistic and unstructured
Targeted and structured
What’s shadow IT?
Is the use of unapproved or unsanctioned technology in a company
What are the attributes of threat actors? Define the attributes
Internal/External => Degree of access of the actor
Sophistication/Capability => Ability to attack
Resources/Funding => Support to the attack
What are the general strategies of threat actors?
- Service disruption
- Data exfiltration
- Disinformation
What are the motivations of threat actors?
- Chaotic motivation
- Financial motivation
- Political motivation
What kind of attack could be done when there’s a financial motivation?
- Blackmail
- Extortion
- Fraud
- Commercial espionage
What’s the difference between Blackmail and Extortion?
Blackmail is when trying to prevent the release of confidential information.
Extortion is trying to prevent some type of attack
What are the threat actor types?
- Hackers
- Unskilled hackers [Script Kiddie]
- Hacker groups [Hacktivists]
- Nation-state actors [APT]
- Organized crime
- Internal [Whitleblower]
Acronym:
APT
Advanced Persistent Threat
What’s a whistleblower?
Internal threat actor with an political motivation to release confidential information
What are the steps of an attack?
- Reconnaissance
- Social Engineering
- Technical approaches
- Breach the system
- Escalate privilege
- Backdoor
- Stage computers
- Exploit vulnerabilities
What’s reconnaissance?
The process of gathering information about an organization, its users, hardware and software
What’s Social Engineering?
The process of manipulating others into providing sensitive information or doing unauthorized procedures
What’s to stage computers?
The process of preparing computers to perform additional tasks in the attack
List:
Defense security concepts
- Layering [Defense in depth]
- Principle of least privilege
- Variety
- Randomness
- Simplicity
Define the concept of layering (Defense in depth)
It’s the implementation of multiple security strategies to protect the same asset.
If one is bypassed, there’s multiple others to protect
Define the concept of Variety
It’s the variety of methods in defensive layers, for the multiple use of the same method isn’t secure
Define the concept of ‘Principle of least privilege’
Users have only the access they need to do their jobs and nothing more.
Define the concept of ‘Radomness’
Constant change in personal habits, passwords, in order do prevent predictability
What’s an attack surface?
Potential vector for attempting an intrusion
How can vulnerabilities be exploited?
Remote and local.
Remote are exploited unauthenticated
Local are exploited with valid credentials
What’s a secure network?
Identifies, authenticate, authorize and audit network users, hosts and traffic.
What’s a threat vector?
A path an attacker might use to attack
What’s the difference between threat vector and attack vector?
Threat vector is the potential path of an attack.
Attack vector is the path used in a successful attack
What are the attack vector types?
- Vulnerable software
- Network vector
- Lure-based vector
- Message-based vectors
- Supply chain
- Human vector
What are the network vectors?
- Direct access (physical)
- Wired network
- Remote network
- Cloud access
- Bluetooth network
- Default credentials
- Open service ports
What is the ‘Cloud access’ network vector?
The compromise of an administrative cloud account
What’s the ‘Direct access’ network vector?
It’s the compromise the physical place where network devices are
What’s the ‘Wired network’ network vector?
The attaching of unauthorized devices to the physical network, with permitted communication