Module 2 Flashcards

Network Threats

1
Q

What is Risk Management?

A

The process of identifying, prioritizing, managing, and monitoring risks to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the common ways to manage risk?

A

Risk acceptance, risk reduction, and risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the term Hacker used?

A

To describe a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

White hat hackers

A

Ethical hackers use their skills for good, ethical, and legal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grey hat hackers

A

Individuals who commit crimes and do unethical things, but not for personal gain or to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black hat hackers

A

Criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of threat actors?

A

Script kiddies, vulnerability brokers, hacktivists, cybercriminals, and state-sponsored hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How have attack tools developed?

A

They became more sophisticated and highly automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some attack tools?

A

Password crackers, wireless hacking tools, network security scanning and hacking tools, packet crafting tools, packet sniffers, rootkit detectors, fuzzers to search vulnerabilities, forensic tools, debuggers, hacking operating systems, encryption tools, vulnerability exploration tools, and vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different categories of attacks?

A

eavesdropping attacks, data modification attacks, IP address spoofing attacks, password-based attacks, denial-of-service attacks, man-in-the-middle attacks, compromised key attacks, and sniffer attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do threat actors try to trick users into installing malware?

A

To help exploit end-device vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antimalware software cannot be updated quickly enough to stop new threats. (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three common types of malware?

A

Virus, worm, and Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a virus?

A

A type of malware that spreads by inserting a copy of itself into another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do most viruses spread?

A

Through USB memory drives, CDs, DVDs, network shares, and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Trojan horse?

A

A software that appears to be legitimate, but it contains malicious code that exploits the privileges of the user that runs it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where are Trojans often found?

A

In online games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are Trojans classified?

A

According to the damage they cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the different types of Trojans?

A

Remote-access, data-sending, destructive, proxy, FTP, security software, disabler, DoS, and keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are worms similar to viruses?

A

They replicate and can cause the same type of damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do Viruses need to run?

A

A host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do worms run?

A

They can run by themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three components worm attacks consist of?

A

Enabling vulnerability, propagation mechanism, and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the most dominant malware currently?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does ransomware work?
It denies access to the infected system or its data. The cybercriminals then demand payment to release the computer system
26
Other malware besides viruses, worms, and Trojan horse
Spyware, adware, scareware, phishing, and rootkits
27
Three major categories of attacks from outside the network
Reconnaissance, access, and DoS attacks
28
What is reconnaissance?
Information gathering. Threat actors do unauthorized discovery and mapping systems, services, or vulnerabilities
29
Examples of using Reconnaissance before access or DoS attacks
Performing an information query of a target, initiating a ping sweep of the target network, initiating a port scan of active IP addresses, running vulnerability scanners, and running exploitation tools
30
What do access attacks exploit?
Known vulnerabilities in authentication services, FTP services, and web services
31
Access attacks
Password attacks, spoofing attacks, trust exploitation attacks, port redirections, man-in-the-middle attacks, and buffer overflow attacks
32
How does access attack social engineering work?
Attempts to manipulate individuals into performing unsafe actions or divulging confidential information
33
Social engineering attack methods
Pretexting, phishing, spear phishing, spam, something for something, baiting, impersonation, tailgating, shoulder surfing, and dumpster diving
34
Two major DoS attacks
overwhelming quantity of traffic, and maliciously formatted packets
35
What is the difference between DoS and DDoS attacks?
DDoS attacks increase in magnitude because they originate from multiple, coordinated sources
36
What are the terms that describe DDoS attacks?
zombies, bots, botnet, handlers, and botmaster
37
What is Mirai?
A malware that targets IoT devices configured with default login information
38
What does Mirai do?
It uses a brute-force dictionary attack. After successful access, it targets the Linux-based BusyBox utilities that are designed for these devices
39
What is the goal of a threat actor when using a buffer overflow DoS attack?
To find a system memory-related flaw on a server and exploit it
40
What does overwhelming the buffer memory with unexpected values do to a system?
It renders it inoperable, creating a DoS attack
41
Many attacks use stealthy evasion techniques to disguise an attack payload (T/F)
True
42
Evasion methods
encrypting and tunneling, resource exhaustion, traffic fragmentation, protocol-level misinterpretation, traffic substitution, traffic insertion, pivoting rootkits, and proxies
43
Attack surface
The total sum of vulnerabilities in a given system that are accessible to an attack. It also describes different points where an attacker could get into a system, and where they could get data out of the system
44
Exploit
The mechanism that is used to leverage a vulnerability to compromise an asset. They could be remote and local.
45
Remote Exploit
Works over the network without any prior access to the target system. The attacker does not need an account in the end system to exploit the vulnerability.
46
Local Exploit
The threat actor has some type of user or administrative access to the end system. It does not necessarily mean that the attacker has physical access to the end system
47
Risk
The likelihood that a particular threat will exploit a particular vulnerability of an asset and result in an undesirable consequence
48
Risk acceptance
This is when the cost of risk management options outweighs the cost of the risk itself. The risk is accepted
49
Risk avoidance
This means avoiding any exposure to the risk by eliminating the activity or device that presents the risk. By eliminating an activity to avoid risk, any benefits gained from the operation or activity that is at risk
50
Risk reduction
Reduces exposure to risk or reducing the impact of risk by taking action to decrease the risk.
51
What is the most commonly used mitigation strategy?
Risk reduction
52
What does risk reduction require?
Careful evaluation of the costs of loss, the mitigation strategy, and the benefits gained from the operation or activity that is at risk
53
Risk transfer
Some or all of the risk is transferred to a willing third party such as an insurance company
54
Countermeasure
The actions that are taken to protect assets by mitigating a threat or reducing risk
55
Impact
The potential damage to the organization that is caused by the threat
56
Which exploit requires inside network access such as a user with an account on the network? Local or remote?
Local exploit
57
What is a script kiddie?
Refers to teenagers or inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit
58
What is a vulnerability broker?
Grey hat hackers who attempt to discover exploits and report them to vendors sometimes for prizes or rewards
59
What are hacktivists?
Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks
60
What is a cybercriminal?
Black hat hackers who are either self-employed or working for large cybercrime organizations. Each year, cybercriminals are responsible for streaming billions of dollars from consumers and businesses
61
What is a state-sponsored hacker?
Threat actors who steal government secrets, gather intelligence, and sabotage networks of foreign governments, terrorist groups, and corporations. Most countries in the world participate
62
Where do cybercriminals operate?
In an underground economy where they buy, sell, and trade exploits and tools. They also buy and sell personal information and intellectual property that they steal from victims
63
What do cybercriminals target?
Small businesses and consumers, as well as enterprises and industries