Module 1 - Cybersecurity Threats, Vulnerabilities, and Attacks Flashcards

1
Q

What is a Threat Domain?

A
  • An area of control, authority, or protection that attackers can use to gain access to a system.
  • Organisations needs to know what vulnerabilities exist within their threat domains.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of exploitation of Threat Domains

A
  • Direct physical access to systems and networks
  • Wireless network that extends beyond an organisations boundaries
  • Bluetooth or NFC (Near Field Connection) devices
  • Malicious email attachments
  • Less secure elements within an organisation’s supply chain
  • An organisation’s social media accounts
  • Removable media such as flash drives
  • Cloud based applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List types of cyber threats with examples

A
  • Software attacks
    • A successful DoS attack
  • Software errors
    • A software bug
  • Sabotage
    • An authorised user successfully accessing and compromising an organisation’s database
  • Human error
    • A firewall misconfiguration
  • Theft
    • Laptops or other equipment being stolen
  • Hardware Failures
    • A hard drive failure
  • Utility interruption
    • A power outage
  • Natural disasters
    • Earthquake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Internal Threats?

A
  • Usually carried out from within the organisation
  • Maybe by a former employee or a contractor who, for example, mishandles confidential data or allows malicious software onto a network
  • Normally end up being worse than External Threats since they would have intimate knowledge of internal services and direct access to resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are External Threats?

A
  • Usually carried out from outside the organisation
  • Normally a hacker of some kind that exploits vulnerabilities in equipment/software or uses social engineering to get what they need
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a User Domain?

A
  • Includes anyone with access to an organisation’s systems
  • May include employees, customers, and contract partners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Private Cloud Domain?

A
  • Includes any private servers, resources and IT infrastructure available to members of a single organization via the Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a LAN Domain?

A
  • Includes any devices connected locally via Wifi or Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Public Cloud Domain?

A
  • The entirety of computing services hosted by a cloud, service or Internet provider that are available to the public and shared across organizations.
  • Includes the SaaS, PaaS, and IaaS models.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Application Domain?

A
  • Includes all of the critical systems, applications and data used by an organization to support operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an APT?

A
  • Advanced Persistence Threat
  • A continuouse attack that uses elaborate espionage tactics along with multiple actors or sophisticated malware to access and analyse a target’s network.
  • Attackers will attempt to go under the radar for an extended period of time
  • Typically targets high-level organisations and are well fund and well organised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Algorithm Attack?

A
  • Takes advantage of algorithms in legitimate software to generate unintended behaviors
  • For example, tracking and reporting how much power a computer uses to show false alerts or select targets. Can also be used to disable a computer by forcing it to use up all its RAM/CPU.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is OSINT?

A
  • Open Source Intelligence
  • Security data that doesn’t require a paid subscription to access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of Backdoors

A
  • Netbus
  • Back Orifice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Rootkit?

A
  • Malware that modifies the OS of a device to create a backdoor. Not a backdoor in and of itsself.
  • Can modify system forensics and monitoring tools making themselves hard to detect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CVE?

A
  • Common Vulnerabilities and Exposures
  • Sponsored by US-CERT (United States Computer Emergency Readiness Team) and the Department of Homeland Security
  • Maintained by the MITRE Corporation
17
Q

List threat intelligence and research sources

A
  • CVE
  • The Dark Web - Content not indexed by conventional search engines. Researchers monitor the dark web for threat intelligence.
  • IOCs (Indicators of Compromise) - For example malware signatures and domain names can provide evidence of security breaches and information about them
  • AIS (Automated Indicator Sharing) - A capability of CISA (Cybersecurity and Infrastructure Security Agency) that enables the real time exchange of cybersecurity threat indicators using a standardised language called STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated Exchange of Intelligence Information).
18
Q

What is Social Engineering?

A
  • A non-technical strategy that attempts to manipulate users into performing certain actions or divulging certain sensitive information
19
Q

List types of Social Engineering

A
  • Pretexting - An individual lies to gain access to sensitive data (e.g. Someone asking you to confirm personal information to validate you when they don’t need to)
  • Quid Pro Quo - Requesting sensitive information in exchange for something else (e.g. Money)
  • Identity Fraud - The use of a person’s stolen identity to obtain information. (e.g. Issuing a credit card in someone else’s name)