Module 1 - Introduction to Security Flashcards
What are the 3 reasons that a legacy platform has not been updated?
1) limited hardware capacity
2) an application only operates on a specific OS version
3) neglect
What category of threat actors use advanced persistent threats (APTs)?
state actors
typically governments are increasingly employing their own state-sponsored attackers for launching cyber attacks against their foes, state actors are often involved in multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information
What category of threat actors have the lowest level of technical knowledge?
script kiddies
are individuals who want to perform attacks yet lack the technical knowledge to carry them out; they do their work by downloading freely available automated attack software (scripts) and use it to perform malicious acts
Complete this definition of information security: that which protects the integrity, confientiality, and availability of information….
through products, people and procedures on the devices that store, manipulate, and transmit the information
information security is first protection; secondly information security is intended to protect information that provides value to people and enterprises; thirdly information security is to protect the integrity, confidentiality, and availability of information on devices that store, manipulate, and transmit information
Which type of attacker will probe a system for weaknesses and then privately provide that information back to the organization?
white hat hackers
Which component of the CIA triad ensures that only authorized parties can view protected information?
availability
information has value if the authorized parties who are assured of its integrity can access the information; availability ensures that data is accessible to only authorized users and not to unapproved individuals
The first cyber attacks were mainly performed for what purpose?
Fame
the very first cyber attacks were mainly for the threat actors to show off their technology skills; however that soon gave way to threat actors with the focused goal of financial gain (fortune)
What is NOT true regarding the goal/outcome of security?
security is a war that must be won at all costs
the goal is not achieving complete victory but instead maintaining equilibrium as attackers take advantage of a weakness in a defense; defenders must respond with an improved defense; information security is an endless cycle between attacker and defender
What term is not used to describe those who attack computer systems?
hacker
in the past, hacker referred to a person who used advanced computer skills to attack computers; because that title often carried a negative connotation, it has been qualified in an attempt to distinguish between different types of attackers
Which component of the CIA triad ensures that information is correct and no unauthorized person has altered it?
integrity
integrity ensures that the information is correct and no unauthorized person or malicious software has altered the data
What is true regarding the relationship between security and convenience?
security and convenience are inversely proportional
the more secure something is, the less convenient something may become to use
After Bella earned her security certification, she was offered a promotion. She saw that in this position she will report to the CISO and supervise a group of security technicians. Which security position has she been offered?
security manager
the security manager reports to the CISO and supervises techs, admins, and security staff; typically a security manager works on tasks identified by the CISO and resolves issues identified by technicians; this position requires an understanding of configuration and operation but not necessarily technical mastery
What is the term used to describe the connectivity between an organization and a third party?
system integration
typically part of third party where a company needs to connect with a separate company’s network in order to perform business functions/transactions; some of the time the two company’s networks do not integrate seamlessly and require “work-arounds” which can lead to vulnerabilities
How do vendors decide which should be the default settings on a system?
those settings that provide the means by which the user can immediately begin to use the product
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?
brokers
individuals who uncover weaknesses do not report it to the software company but instead sell the vulnerability to the highest bidder
List some recognized attack vectors.
1) email - 94% of all malware is delivered via email
2) wireless - can be intercepted
3) removable media - plugging in random thumb drive embedded with malware
4) direct access
5) social media
6) supply chain - very difficult to defend given the nature of the global economy
What is typically not an issue with patching?
patches addressing zero-day vulnerabilities
1) firmware is difficult to patch, if at all
2) outside of major OS updates, patches for apps are uncommon
3) delays in patching - when an update is available the update may cause an app to not run properly so a business delays updating until it can tweak the business app to work with the new update
What are vulnerabilities associated with legacy platforms?
a legacy platform is no longer in widespread use, often because it has been replaced by a updated version of the earlier technology; although legacy hardware introduces some vulnerabilities, more often vulnerabilities result from legacy software, such as an OS or program
for a variety of reasons - limited hardware capacity, an application that only operates on a specific OS version or even neglect - an OS may not be updated, thus depriving it of these security fixes
What are vulnerabilities associated with improper or weak patch management?
as important as patches are they can create vulnerabilities
- difficulty patching firmware (software embedded into hardware); updating firmware can often be difficult and requires specialized steps
- few patches for application software outside of major OS updates apps are not updated after
- delays in patching OS - companies with system apps will delay deploying a patch if the patch causes the app to not function properly
What are vulnerabilities associated with data storage?
data storage can be considered a 3rd party vulnerability because many organizations rely on 3rd party data storage; this helps to reduce the capital expenditures associated with purchasing, installing and managing new storage hardware and software but also can provide remote access to employees from almost any location
What are vulnerabilities associated with outsourced code?
outsourced code development serves as a 3rd party vulnerability because organization who outsource code development cannot closely monitor the code development and/or do not have the required technical knowledge to identify potential malware in the delivered code
What are some vulnerabilities associated with supply chain?
supply chains serves as 3rd party vulnerabilities; the fact that products move through many steps in the supply chain while some steps are not closely supervised, this has opened the door for malware to be injected into products during their manufacturing or storage ie. supply chain infections
What are some vulnerabilities associated with vendor management?
vendor management is the process organizations use to monitor and manage the interactions with all of their external 3rd parties
system integration is the connectivity between the organization and a 3rd party vendor; this can cause vulnerability because the systems are often not compatible and require work-arounds; another vulnerability can arise because not all organizations are equipped with the expertise to handle the system integration (lack of vendor support)
the principle of the weakest link often is the major risk in working with 3rd parties
List and explain the seven weak configurations that can lead to vulnerabilities.
- default settings: are predetermined for usabliity and ease of use so the user can use the product immediately ex) route comes with default password that is widely known
- open ports and services: devices and services are often configured to allow the most access so that the user can close ports that are specific to that organization ex) firewall comes with FTP ports 20 & 21 open
- unsecured root accounts: a root account can give unfettered access to all resources
- open permissions: open permissions are user access over files that should be restricted
- unsecure protocols: configuration uses protocols for telecommunications that don’t provide adequate protections
- weak encryption: users choosing a known vulnerable encryption mechanism
- errors: human mistakes in selecting one setting over another without considering the security implications
What is zero-day vulnerability?
zero-day vulnerabilities are considered extremely dangerous because systems are open to attack with no specific patches available
this happens when a threat actor finds a vulnerability before the developer has been made aware of the vulnerability
What are some of the vulnerabilities associated with On-Premises Platforms versus Cloud Platforms?
for on-premise platforms vulnerabilities include misconfiguration of resources due to the addition of new servers, software added during growth along with numerous entry points (USB drives, wireless network transmissions, mobile devices, and email)
for cloud platforms the vulnerabilities are most often based on misconfigurations by company personnel; cloud resources are accessible from virtually everywhere putting them under constant threat
What are the 7 attack vectors covered in the book?
1) email
2) wireless
3) removable media
4) direct access
5) social media
6) supply chain
7) cloud
What are COMPETITORS in reference to threat actors?
a category of threat actor where employees become frustrated with the slow pace of acquiring technology so they purchase and install their own equipment or resources in violation of company policies
can cause weaknesses in the network because the equipment may not be configured properly
What are BLACK, WHITE, and GRAY HAT hackers?
a BLACK HAT HACKER is a threat actor who violates computer security for personal gain or to inflict malicious damage
a WHITE HAT HACKER is a threat actor who attempts to probe a system for weaknesses and then privately provide that information back to the organization
a GRAY HAT HACKER is a threat actor who attempts to break into a computer system without the organizations permission but not for their own advantage; instead they publicly disclose the attack in order to shame the organization into taking action
What are script kiddies?
script kiddies are a category of threat actor who want to perform attacks yet lack the technical knowledge to carry them out
they do their work by downloading freely available automated attack software (scripts) and use it to perform malicious acts
What are hacktivists?
a category of threat actor that are strongly motivated by ideology
types of attacks include changing contents of a website to make a political statement
today many hacktivists work through disinformation campaigns by spreading fake news and supporting conspiracy theories
What is a state actor?
a category of threat actor that are sponsored by government for launching cyber-attacks
many security researchers believe state actors might be the deadliest category of threat actor
they are highly skilled and have much more resources than the other categories of threat actors
What is an insider threat?
a category of threat actor that comes from a company’s own employees, contractors, and business partners
What are the principles of social engineering?
social engineering if effective because of 7 principles:
1) authority - to impersonate an authority figure or falsely cite their authority
2) intimidation - to frighten and coerce by threat
3) consensus - to influence by what others do
4) scarcity - to refer to something in short supply
5) urgency - to demand immediate action
6) familiarity - to give the impression the victim is well known and well received
7) trust - to inspire confidence