SB Flashcards

1
Q

What is a model for persuasion and explain what it is

A

Elaboration Likelihood Model:
there are two routes to persuasion:
- Central = presenting a series of statements that, if accepted, convinces
- Peripheral = how the cues are said e.g. adapting according to who you’re talking to

**These strategies can be complimentary and work together too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Principles of persuasion with their meanings and who came up with this

A

Cialdini put forward ‘The psychology of persuasion’

1) Reciprocity = creating a feeling of indebtedness through gifts (convince to make someone do something for you by giving them something, not always something they want) or concessions (salesman comes up with obscene price but makes you feel as though you have to accept after lowering to actual price)

2) Consistency and commitment = ask someone to agree to prevent a crime or get someone to agree on a small inconvenience before a larger one

3) Social proof = create impression that other people agree with or approve of something

4) Liking = advertise a pretty or relatable person doing something (we tend to trust them)

5) Authority = we do what people (who seem to be) in charge (seem to) tell us to do

6) Scarcity = opportunities are seen as more valuable when their availability is limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a pretext?

A

The identity used in the approach, and their supposed reason for making the request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretext guide

A

1) Research = know organisational structure, individual’s interests and personality

2) Seem the part = dress for the part, sound professional or how you should

3) Use the truth = use parts of your real experience

4) Keep it simple = don’t over-plan your identity

5) Appear spontaneous = don’t be obviously working from a script, respond like your assumed identity would

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is HUMINT

A

Human intelligence, what a person can tell you from direct experience of your target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SIGINT

A

Signals intelligence, what a wiretap can tell you from observing your target’s communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is OSINT

A

Open-source intelligence, what normal public sources of information can tell you about your target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a killchain?

A

Model that describes the steps an attacker takes to perform an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber-killchain steps

A

1) Reconnaissance - attacker identifies possible targets e.g. scanning network for vulnerabilities

2) Weaponisation - attacker creates attack payload, typically software but can be a false profile

3) Delivery - attacker transmits payload to victim e.g. advert on server, email with attachment

4) Exploitation - payload exploits target’s vulnerability e.g. gaining access

5) Installation - access through long term back door

6) Command and control - attacker connects target machine to wider infrastructure/establishing communication channel to be used discretely to control machine

7) Actions on objects - attacker benefits from attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are countermeasures for the killchain?

A

Detect - identify attack is happening
Deny - make it impossible for attack to proceed
Disrupt - make it difficult for attack to succeed
Degrade - slow down attack
Deceive - mislead or misdirect attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Limitations of killchain

A

Says little about what came before the attack (how or why attack happens) and what we can do after (recovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Structure of attack tree

A

Root node is goal of attacker
Child nodes are means by which the parent node would be achieved
Lead node is necessary requirement for attaining final result
OR or AND relationships between child nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rules for labelling tree node

A

If node is an OR node, it is labelled possible if any of its children are possible otherwise impossible and vice verca for AND node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

M in MAPE-K

A

Monitoring through a combination of technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A in MAPE-K

A

Analyse through two general approaches:
Misuse detection - search for patterns matching known malicious events in logs

Anomaly detection - analyse logs for anomalous deviations from ordinary behaviour

16
Q

P in MAPE-K

A

Plan response to individual threats through risk which can be assets which need to be protected, countermeasures already in place

17
Q

E in MAPE-K

A

Execute through prevention which are targeted countermeasures to halt an ongoing attack and recovery which are responses to rebuild security

18
Q

K in MAPE-K

A

Knowledge through things like CTI (Cyber Threat Intelligence) - organisations that run honeypots and share info on threats

19
Q

CVE

A

Common Vulnerability Scoring System

20
Q

CAPEC

A

Common Attack Pattern Enumeration and Classification

21
Q

Cybercrime categories

A

Cyber-enabled = traditional forms of crime that have moved online
Cyber-dependent = new forms that would not be possible without computer systems

22
Q

Examples of cybercrimes (name 5)

A

Advance fee fraud
Child SA
Click fraud
Cyberbullying
Data leakage
DOS
Drug dealing
Email spam
Financial malware
Ransomware
Romance scams

23
Q

Why is it difficult to create cyberlaws?

A

Harm can be difficult to locate
The intent can be difficult to prove
Lawmakers don’t always understand technology

24
Q

How are cybercriminals different from traditional criminals?

A

Well educated, often employed, no financial difficulty

25
Q
A