Module 1 - Cybersecurity Threats, Vulnerabilities, and Attacks Flashcards
1
Q
What is a Threat Domain?
A
- An area of control, authority, or protection that attackers can use to gain access to a system.
- Organisations needs to know what vulnerabilities exist within their threat domains.
2
Q
Examples of exploitation of Threat Domains
A
- Direct physical access to systems and networks
- Wireless network that extends beyond an organisations boundaries
- Bluetooth or NFC (Near Field Connection) devices
- Malicious email attachments
- Less secure elements within an organisation’s supply chain
- An organisation’s social media accounts
- Removable media such as flash drives
- Cloud based applications
3
Q
List types of cyber threats with examples
A
- Software attacks
- A successful DoS attack
- Software errors
- A software bug
- Sabotage
- An authorised user successfully accessing and compromising an organisation’s database
- Human error
- A firewall misconfiguration
- Theft
- Laptops or other equipment being stolen
- Hardware Failures
- A hard drive failure
- Utility interruption
- A power outage
- Natural disasters
- Earthquake
4
Q
What are Internal Threats?
A
- Usually carried out from within the organisation
- Maybe by a former employee or a contractor who, for example, mishandles confidential data or allows malicious software onto a network
- Normally end up being worse than External Threats since they would have intimate knowledge of internal services and direct access to resources
5
Q
What are External Threats?
A
- Usually carried out from outside the organisation
- Normally a hacker of some kind that exploits vulnerabilities in equipment/software or uses social engineering to get what they need
6
Q
What is a User Domain?
A
- Includes anyone with access to an organisation’s systems
- May include employees, customers, and contract partners
7
Q
What is a Private Cloud Domain?
A
- Includes any private servers, resources and IT infrastructure available to members of a single organization via the Internet.
8
Q
What is a LAN Domain?
A
- Includes any devices connected locally via Wifi or Ethernet
9
Q
What is a Public Cloud Domain?
A
- The entirety of computing services hosted by a cloud, service or Internet provider that are available to the public and shared across organizations.
- Includes the SaaS, PaaS, and IaaS models.
10
Q
What is an Application Domain?
A
- Includes all of the critical systems, applications and data used by an organization to support operations.
11
Q
What is an APT?
A
- Advanced Persistence Threat
- A continuouse attack that uses elaborate espionage tactics along with multiple actors or sophisticated malware to access and analyse a target’s network.
- Attackers will attempt to go under the radar for an extended period of time
- Typically targets high-level organisations and are well fund and well organised
12
Q
What is an Algorithm Attack?
A
- Takes advantage of algorithms in legitimate software to generate unintended behaviors
- For example, tracking and reporting how much power a computer uses to show false alerts or select targets. Can also be used to disable a computer by forcing it to use up all its RAM/CPU.
13
Q
What is OSINT?
A
- Open Source Intelligence
- Security data that doesn’t require a paid subscription to access
14
Q
Examples of Backdoors
A
- Netbus
- Back Orifice
15
Q
What is a Rootkit?
A
- Malware that modifies the OS of a device to create a backdoor. Not a backdoor in and of itsself.
- Can modify system forensics and monitoring tools making themselves hard to detect.