PRELIM Flashcards
___ is the most concerned matter as cyber threats and attacks are overgrowing.
Cyber security
Measures taken to protect a computer or computer system (on the internet) against unauthorized access or attack?
Cyber security
Sending emails that appear to be from legitimate companies requesting personal information.
Phishing
An interruption in an authorized user’s access to a computer network, typically one caused with MALICIOUS INTENT.
DoS or Denial-of-Service
Any type of malicious software is designed to harm or exploit any programmable device, service or network.
Malware
_____ is a method of gaining unauthorized access to a network or computer system.
Hacking
An individual who intends to gain unauthorized access to a network or computer system.
Hacker
The entirety of potential and identified cyberthreats affecting a particular sector, group of users, time period, and so forth.
Threat landscape
Give two examples of Treat landscape
- ENISA (European Union Agency for Network and Information Security)
- NIST (National Institute of Standards and Technology)
____ defined as the collection of threats that are observed, information about threat agents, and the current trends of threats
Threat landscape
___ are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.
Cyber threats
The three categories under cyber threats
- Intentional threats
- Unintentional threats
- Natural threats
___ are the gaps or WEAKNESSES in a SYSTEM that MAKE threats possible and tempt threat actors to EXPLOIT them.
Vulnerabilities
___ is the POTENTIAL for LOSS, damage or destruction of assets or data caused by a cyber threat.
Risk
___ is a process that magnifies the likelihood of a negative event, such as the exploit of a vulnerability.
Threat
____ is a weakness in your infrastructure, networks or applications that potentially exposes you to threats
Vulnerability
____ makes sure that only authorized personnel are given access or permission to modify data
Confidentiality
___ helps maintain the trustworthiness of data by having it in the correct state and immune to any improper modifications
Integrity
____ means that the authorized users should be able to access data whenever required
Availability
Pros of the CIA triad
- Simplicity
- Balanced
- Open-ended
Cons of the CIA triad
- Limited
- Lack of specificity
- Not holistic
Threat probability is multiplied by the POTENSIAL LOSS that may result, cyber security experts, refer to this as a ___
Risk
Five common types of cyber attacks
- DoS and DDoS
- Malware
- Man-in-the-middle (MITM)
- Phishing
- SQL Injection
OTHER type of cyber attacks
- DNS Spoofing
- Session Hijacking
- Brute force
- Dictionary attacks
- URL Interpretation
- File Inclusion attacks
____ stands for “Malicious Software”
Malware
___ it is designed to gain access or be installed into the computer without the consent of the user
Malware
Types of Malware
- Adware
- Spyware
- Browser hijacking software
- Virus
- Worms
- Trojan Horse
- Scareware
It represents threats that are result of a harmful decision. For example computer crimes, or when someone purposely damages property or information. Computer crimes include espionage, identity theft, child pornography, and credit card crime.
Intentional threats
_____are acts performed without malicious intent that nevertheless represent a serious threat to information security.
_____are often attributed to human error.
Unintentional threats
While acts of nature aren’t typically associated with cybersecurity, they are unpredictable and have the potential to damage your assets.
Natural threats
When AUTHENTICATION credentials are compromised, user sessions and identities can be hijacked by malicious actors to pose as the original user.
Broken Authentication
to gain access to database content via malicious code injection
SQL Injection
also injects malicious code into a website.
targets website users
Cross-Site Scripting
to trick an authenticated user into performing an action that they DO NOT intend to do
Cross-Site Request Forgery
Any component of a security system that can be leveraged by attackers due to a configuration error can be considered a __________
Security Misconfiguration
Five most common examples of Security Vulnerabilities
- Broken Authentication
- SQL Injection
- Cross-Site Scripting
- Cross-Site Request Forgery
- Security Misconfiguration
is “an attack initiated from a computer against a website, computer system or individual computer … that compromises the confidentiality, integrity or availability of the computer or information stored on it.
Cyber Attack
The seven layers of cyber security
- Mission Critical Assets
- Data Layer
- Application Layer
- End Point Layer
- Network Layer
- Perimeter Layer
- Human Layer
___is designed to stop your networks from working. They can’t pull the plug on your systems, so instead they bombard them with requests and data.
denial-of-service attack
Once inside your system, malware can do some or all of the following:
Block access to key components of your network
Covertly obtain information by transmitting data out of your network
Disrupt components and render your system inoperable
Malware
___ occur when attackers insert themselves into a data transaction. Between you and your online bank, for example. Once the attacker interrupts the traffic, they can filter and steal data.
Man-in-the-middle (MitM) attacks
comes from the word “fishing” and deploys the same tactics. Using the right kind of bait, an unsuspecting target can be caught.
Phishing
An attacker can force a server to reveal information you would rather have safe by injecting queries using __________
Structured Query Language (SQL)
____ can go on for a lOng periOd of time without being detected and can cause serious security issues
DNS Spoofing
It is a security attack on a user SESSION over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data
Session Hijacking
It is a type of attack which uses a trial-and-error method. This attack generates a large number of guesses and validates them to obtain actual data like user passwords and personal identification numbers. This attack may be used by criminals to crack encrypted data, or by security analysts to test an organization’s network security.
Brute force
This type of attack stored the LIST of a commonly used passwords and validated them to get original password
Dictionary attacks
It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages for which he is not authorized to browse.
URL Interpretation
It is a type of attack that allows an attacker to access unauthorized or ESSENTIAL files which is available on the web server or to execute malicious files on the web server by making use of the include functionality.
File Inclusion attacks
It is a special type of malware which is used for forced ADvertising.
Adware
It is a special type of which is installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine.
Spyware
There is some malicious software which are downloaded along with the free software offered over the internet and installed in the host computer without the knowledge of the user. This software modifies the browsers setting and redirect links to other unintentional sites.
Browser hijacking software
___ is a malicious code written to damage/harm the host computer by deleting or appending a file, occupy memory space of the computer by replicating the copy of the code,
slow down the performance of the computer, format the host machine, etc.
Virus
They are a class of viruses which can REPLICATE themselves.
Worms
____is a malicious code that is installed in the HOST machine by pretending to be useful software. The user clicks on the link or download the file which pretends to be a useful
file or software from legitimate source.
Trojan Horse
While surfing the Internet, suddenly a pop-up alert
appears in the screen which warns the presence of dangerous virus, spywares, etc.
Scareware
Operational cyber security risks arise from
Three types of actions
- Inadvertent actions
- Deliberate actions
- Inaction actions
Three categories of motivation when deliberate
- Political motivations
- Economic motivations
- Socio-cultural motivations
Categories of Attacks
- Active
- Passive
____are a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target
Active attacks
Types of Active attacks
- Masquerade
- Session replay
- Message modification
_____ are relatively scarce from a classification perspective, but can be carried out with relative ease, particularly if the traffic is not encrypted
Passive attacks
Types of PassivE aTtackS
- Eavesdropping (tapping)
- Traffic analysis
- Software Attacks
Decide which of the CIA
Alice and Bob are students. Alice copies Bob’s homework.
Confidentiality
Decide which of the CIA
Alice and Bob play computer games. Right as Alice is about to slay Bob’s character with a +10 spell, Bob yanks her Ethernet cable.
Availability
Decide which of the CIA
Alice writes a private note in her diary and then locks it. Unfortunately,
Bob finds the key and is able to open Alice’s diary and read her private
note.
Confidentiality
Decide which of the CIA
Bob sends Alice a check for $10. She then adds a “0” to the amount so now Bob has sent Alice a check for $100.
Integrity
Decide which of the CIA
Alice has online homework due at 2:00 PM and she is rushing to finish it. Right before she is about to submit, her power cuts out and Alice is no longer able to submit her homework by the due date.
Availability