Modules 3 + 4 Flashcards

1
Q

Nation State/APT threat actor

A

Motivation: national interests, espionage, disruption, war

Sophistication level: high

Funding: unmatched. Will hire world experts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unskilled attacker/“script kiddie “

A

Motivation: destruction, prestige

Sophistication level: low: no enough to be dangerous; uses tools without fully understanding them

Funding: low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Activist threat actor

A

Motivation: disruption, ethics, philosophy, politics: to further a social/political cause

Sophistication level: moderate

Funding: moderate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized crime threat actor

A

Motivation: furthering criminal enterprise – gaining popularity, money

Sophistication level: high – ransom data, theft, extortion, blackmail, identity, theft

Funding: high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider threat

A

Motivation: disruption, revenge, blackmail; sometimes disgruntled, but sometimes just incompetent or uneducated

Sophistication level: moderate

Funding: low

Internal !!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shadow IT

A

Motivation: want to be helpful, and/or circumvent policies or security controls in the process, prestige

Sophistication level: low/moderate

Funding: low

Note: internal!!*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering threat vectors (5)

A

Social engineering: Talking someone into divulging information they normally wouldn’t by establishing false pretext or applying social pressure

1 Messages: email, SMS/text, chat/DM’s/IMS- PHISHING
Voice: vishing

2 impersonation

3 misinformation

4 pre-texting

5 watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Removable media threat vector

A

– Data can be filtrated via a removable media and malware can be introduced

– “Air gapped “systems can also be compromised this way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File-based attacks – 3

A
  1. Malware via downloaded file/email attachment.
  2. File less - no file that stays on the system. It removes itself.
  3. Malicious images – stenography: concealing data within other non-sensitive data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat vectors (9)

A
  1. social engineering
  2. File-based attacks.
  3. Removable media – mass storage devices.
  4. Vulnerable software.
  5. Unsupported systems/applications.
  6. Unsecured networks.
  7. Open network ports.
  8. Default credentials.
  9. Supply chain attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Air gapped system

A

A highly secure computer/network that is also physically isolated from any other network, including the Internet

Sometimes they use removable media to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerable software

A

– Can have security flaws baked in due to inadvertent oversight

– Patch and update ASAP always!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unsupported systems/applications

A

– Any system connected to an organizations network should be identified and monitored
- Any software should be listed and watched for updates
– Users independently, introducing systems or software that doesn’t regularly get patched/updated equals vulnerability!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two ways to scan software

A
  1. Client based/agent based – use software (agent) on endpoint systems (devices) to scan software and report back to central server
  2. Agentless – using a network service to scan for/enumerate hosts and query hosts software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Endpoint system

A

Any device that connects to a network, such as a laptop, desktop, smartphone, or server. Think of it as the final stop in a network where users interact with applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 7 components of a network?

A
  1. Router – Directs internet traffic, assigns IP addresses.
    1. Switch – Connects multiple devices inside a network for faster communication.
    2. Modem – Converts internet signals from the ISP into usable data.
    3. Firewall – Protects network traffic by filtering unauthorized access.
    4. Server – Stores and provides data, websites, or services to devices.
    5. Access Point (AP) – Expands wireless network coverage.
    6. Network Cables & Fiber Optics – Provide physical connections for fast, stable data transfer.
17
Q

3 types of Unsecured networks (for test)

A
  1. Wired – active network ports, especially in public/traffic/vacant areas.
  2. Wireless – vulnerable security via insecure protocols, transmitting beyond confines of facility. NOTE: it is NOT illegal to receive wireless traffic, it’s in public space.
  3. Bluetooth – always beaconing its ID when active to any device. Used in retail store tracking based on Bluetooth ID.
18
Q

Open network ports

A

• Open ports leave systems vulnerable to cyberattacks.
• Attackers can scan, exploit, or send malicious traffic through open ports.
• Mitigation:
• Close unused ports.
• Disable unnecessary services.
• Use a firewall to filter traffic.
• Monitor network activity.

19
Q

Network port

A

A virtual door, allowing data to reach network services

20
Q

Ransom as a service

A

Bring a gang a target and ways to deliver ransom and they’ll share the profits from the attack they’ll carry out on your behalf with you

21
Q

BONUS: types of networks

A
  • Cellular Networks (4G/5G) → Used for mobile phones and IoT devices.
    • Satellite Networks (VSAT, Starlink, GPS) → Used for global communication.
    • Near Field Communication (NFC) → Contactless payments like Apple Pay.
    • Infrared (IR) Networks → Used in remote controls, short-range data transfer.
    • Mesh Networks → Devices communicate in a decentralized way (e.g., smart homes).
    • Ad-hoc Networks → Temporary networks without centralized control (e.g., military).
22
Q

Host

A

any device that connects to a network and can send or receive data. This includes:
• Computers (Desktops, Laptops, Servers) → Store and process data.
• Mobile Devices (Phones, Tablets, Smartwatches) → Connect to networks for communication.
• Network Hardware (Routers, Switches, Firewalls, IoT Devices, etc.) → Manage and direct data flow.

23
Q

Default credentials

A

Often admin: admin

Big problems; scanners exist to exploit this on commercial devices

24
Q

How hosts work in a network?

A

How Hosts Work in a Network
• Hosts communicate using IP addresses. Each device has a unique identifier (like a home address).
• They interact via ports. If a host is running a web server, it “listens” for requests on port 80 (HTTP) or port 443 (HTTPS).
• Hosts can be servers or clients.
• A server is a host that provides services (e.g., a web server hosting a website).
• A client is a host that requests services (e.g., your laptop requesting a webpage).

26
Q

Supply chain attacks: how it works and vectors

A

Vectors: 1 managed service providers, 2 vendors, 3 suppliers

How it works: attacker targets a less-secure link/system within the target organizations supply chain. The target information may be in a less protected system.

27
Q

Social engineering

A

Tactics to illicit information/behavior from people that they wouldn’t normally give/do

28
Q

Phishing

A

Sending messages that appear legit, but are meant to lower the person into providing personal information or interact with a link/file. Usually email; low-effort.

29
Q

Spear phishing

A

Targeting specific people because of their level of authorization

30
Q

Vishing

A

Voice plus Phishing– using fishing techniques over voice calls

31
Q

Whaling

A

Going after “big fish “– leadership personnel

NOTE: if the test mentions “CEO “it’s a whaling question

32
Q

Smishing

A

SMS + phishing– phishing techniques via SMS/text

33
Q

Impersonation (social engineering)

A

Pretending to be someone that a target is likely to trust or consider an authority in order to illicit information. The target wouldn’t otherwise give.

  • brand impersonation: pretending to represent a company the target may want to work with
34
Q

Misinformation

A

Giving false information to trick someone into doing something for you

EX: your computer is at risk !! messages

35
Q

Pre-texting

A

Preemptive context

Attacker creates a fake backstory to trick the target into doing something against there or their organizations interests

Example: calling ahead to let the front desk know an inspector will arrive tomorrow and will need access to the elevator control room and primary data center to groom employees into granting access when prompted

36
Q

Watering hole attack

A

Attackers lay in weight for pray to come to them

37
Q

Typosquatting

A

Buying a domain similar to a popular site to catch people who miss typed the URL or miss the typo or trust it based on similarity

Example: gooogle.com or W0RK day