Module 3 Flashcards
What are the 3 CIA Triad
Confidentiality, Integrity, Availability
Anything of value to the organization. It includes people, equipment, resources, and data
Asset
A weakness in a system, or its design, that could be exploited by a threat
vulnerability
A potential danger to a company’s assets, data, or network functionality
threat
A mechanism that takes advantage of a vulnerability
exploit
Counter-measure that reduces the likelihood or severity of a potential threat or risk.
mitigation
The likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization
risk
A path by which a threat actor can gain access to a server, host, or network.
attack vector
____ or data exfiltration is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world
Data loss
What should be done to confidential data no longer required by a company
shredded
Hackers are also called as ____
threat actors
Ethical hackers who use their programming skills for good, ethical, and legal purposes.
White Hat Hackers
These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage
Gray Hat Hackers
These are unethical criminals who compromise computer and network security for personal gain, or for malicious reasons, such as attacking networks
Black Hat Hackers
These are teenagers or inexperienced hackers running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
Script Kiddies
These are usually gray hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
Vulnerability Broker
These are gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks.
Hacktivists
These are black hat hackers who are either self-employed or working for large cybercrime organizations
Cyber criminals
These are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks. Their targets are foreign governments, terrorist groups, and corporations
State-Sponsored
Penetration Testing Tool which repeatedly make guesses in order to crack the password
Password Crackers
Penetration Testing Tool used to intentionally hack into a wireless network to detect security vulnerabilities.
Wireless Hacking Tools
Tools that are used to probe network devices, servers, and hosts for open TCP or UDP ports.
Network Scanning and Hacking Tools
These tools are used to probe and test a firewall’s robustness using specially crafted forged packets
Packet Crafting Tools
These tools are used to capture and analyze packets within traditional Ethernet LANs or WLANs
Packet Sniffers
Tools used by threat actors to discover a computer’s security vulnerabilities.
Fuzzers to Search Vulnerabilities
These tools are used by white hat hackers to sniff out any trace of evidence existing in a computer.
Forensic Tools
These tools are used by black hats to reverse engineer binary files when writing exploits.
Debuggers
This is when a threat actor captures and “listens” to network traffic.
Eavesdropping Attack
If threat actors have captured enterprise traffic, they can alter the data in the packet without the knowledge of the sender or receiver (type of threat actor attack)
Data Modification Attack
This happens when a threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet
IP Address Spoofing Attack
Type of attack where threat actors could use a valid account to obtain lists of other users, network information, change server and network configurations, and modify, reroute, or delete data.
Password-Based Attacks
A ___ attack prevents normal use of a computer or network by valid users. It can also flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
Denial of Service Attack
This attack occurs when threat actors have positioned themselves between a source and destination. They can now actively monitor, capture, and control the communication transparently
Man-in-the-Middle Attack
If a threat actor obtains a secret key, that key is referred to as a compromised key. A compromised key can be used to gain access to a secured communication without the sender or receiver being aware of the attack
Compromised-Key Attack
___ require human action to propagate and infect other computers.
viruses
____ hides by attaching itself to computer code, software, or documents on the computer.
virus
This type of malware is a program that looks useful but also carries malicious code. They are often provided with free online programs such as computer games.
trojan horses
Type of malware that can display unsolicited advertising using pop-up web browser windows, new toolbars, or unexpectedly redirect a webpage to a different website
adware
Type of malware that denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key.
ransomware
Used by threat actors to gain administrator account-level access to a computer. They are very difficult to detect because they can alter firewall, antivirus protection, system files, and even OS commands to conceal their presence.
Rootkit
Like adware but, used to gather information about the user and send to threat actors without the user’s consent.
spyware
What does CVE stand for?
Common Vulnerabilities and Exposures
A self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software. The intent of is usually to slow or disrupt network operations
worm
What does CWE stand for?
Common Weaknesses Enumeration
List of known instances of vulnerabilities within a product or a
system
Common Vulnerabilities and Exposures (CVE)
Dictionary of weaknesses that may lead to vulnerability
Common Weaknesses Enumeration (CWE)
Threat actors use this attack to do unauthorized discovery and mapping of systems, services, or vulnerabilities. This attack precedes access attacks or DoS attack
Reconnaissance Attacks
This type of attack exploits known vulnerabilities in authentication services, FTP services, and web services. The purpose of is to gain entry to web accounts, confidential databases, and other sensitive information
access attacks