Security Concepts - CyberSecurity Fundamentals Flashcards

1
Q
  • typically found in web applications.

- enable attackers to inject client-side scripts into web pages viewed by other users

A

Cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • also known as one-click attack or session riding
  • cause victims to run actions on already authenticated sessions
  • is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.
A

Cross-site request forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid
A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker)
A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • is any software intentionally designed to cause damage to a computer, server, client, or computer network
A

Malware (malicious software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication
A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other
A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • is a malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software. may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers, antivirus disablers, and bots for DDoS attacks
  • design to go undetected
  • can be installed in computer kernel
A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled
A

denial-of-service attack (DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • the incoming traffic flooding the victim originates from many different sources
A

distributed denial-of-service attack (DDoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • is a vulnerability that allows attackers to break out of a web server’s root directory and access other locations in the server’s file system
A

Path Traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • occurs when data written to a buffer also corrupts data values in memory addresses adjacent to the destination buffer due to insufficient bounds checking. This can occur when copying data from one buffer to another without first checking that the data fits within the destination buffer
A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • is a type of malware that propagates by inserting a copy of itself into and becoming part of another program
  • will not be active or able to spread until a user runs or opens the malicious host file or program
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • replicate functional copies of themselves and can cause the same type of damage.
  • standalone software and do not require a host program or human help to propagate
  • attack vulnerability’s of the system
A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • It is a harmful piece of software that looks legitimate.
  • do not reproduce by infecting other files nor do they self-replicate
  • create backdoors to give malicious users access to the system
  • cannot replicate itself and must be installed by user
A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • convincing victims they are trusted authority
  • the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Type of Phishing with no target

A

Bulk Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Type of Phishing with specific target

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Spear Phishing high profile target
  • is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization,
A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • Type of Phishing the Clone Logos of Legit Service
A

Clone Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NIST stands for

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • is a collection of industry standards and best practices to help organizations manage cybersecurity risk
A

NIST CyberSecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • a potential danger to asset
A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • entity that takes advantage of vulnerability
A

Malicious Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • Path use by Malicious Actor
A

Threat Agent/Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Weakness in the system design, implementation, software or code or lack of a mechanism

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • vulnerabilities identifier

- is a list of publicly disclosed computer security flaws.

A

CVE - Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • refers to a piece of software, tool, technique or a process that takes advantage of a vulnerability
A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • no one may even know vulnerability exist and it is exploited
A

Zero Day Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  • the probability of likelihood of the occurrence or realization of threat
A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

3 Elements of risk

A

Asset, threats, Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  • any item of economic value owned by individual or corporation
A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  • non profit charitable organization that leads several industry wide initiatives to promote the security of applications and software
A

OWASP (Open Web Application Security Project)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  • provides a standard set of definitions for different aspect of Cloud computing
A

NIST Definition of Cloud Computing

37
Q
  • Cloud computing model where you rent the insfrastructure
A

Infrastructure as a service (IaaS)

38
Q
  • Cloud computing model where you they provide everything except applications
A

Platform as a Service (PaaS)

39
Q
  • Cloud computing model where they provide the complete package solution
A

Software as a Service (SaaS)

40
Q
  • Cloud computing attacks occurs when the attacker can sniff traffic and intercept traffic to take over a legitimate connection to cloud
A

session hijacking

41
Q
  • cloud computing attacks tricks user to visit a phishing site and giving up a valid credential
A

DNS attack

42
Q
  • cloud computing attacks used to steal cookies that can use to gain access as an authenticated users to a cloud service
A

cross-site-scripting (xss)

43
Q
  • cloud computing attacks exploits vulnerable cloud-based applications that allow attacker to pass SQL commands
A

SQL injection

44
Q
  • cloud computing attack use to describe cross-site request forgery
A

session riding

45
Q
  • cloud computing attack when the attacker place himself in between communication path between two users
A

man-in-the-middle cryptographic

46
Q
  • cloud computing attack where attacker could attempt to compromise the cloud by placing a malicious virtual machine in close proximity to a target cloud servr and then lauching side channel attack
A

side-channel attack

47
Q

-cloud computing attack where it target weak authentication

A

authentication attack

48
Q
  • cloud computing attack where attacker can take advantage of API misconfiguration to modify delete append data in application or system in cloud environment
A

API attack

49
Q
  • One of the most popular IoT protocols supported by many consumer IoT devices. Takes advantage of the underlying security services provided by the IEEE 802.15.4 Mac layer.
A

Zigbee

50
Q

-IoT protocols. Bluetooth protocols that is designed for enhanced battery life for IoT Devices

A

BLE (Bluetooth Low Energy)

51
Q

IoT Bluetooth protocols. devices default to sleep and wake up only when needed. Support AES encryption

A

Bluetooth Smart

52
Q
  • IoT protocols. Support multicast, unicast and broadcast communication.
A

Z-wave

53
Q

-IoT protocols. Allow IoT devices to communicate wirelessly and over the power lines.

A

INSTEON

54
Q

-IoT protocols. A networking protocols designed specifically for IoT implementations.

A

LoRaWAN (Long-Range-Wide-Area-Network)

55
Q

-IoT protocols. Still one of the most popular communications methods between IOT

A

WiFi

56
Q

-IoT Protocols. Supports the use of IPV6 in the network constrained IoT implementation. Designed to support wireless internet connectivity at lower data rates

A

6LoWPAN (IPv6 over low power wireless personal area networks) and LRWPAN(Low rate wireless personal area networks)

57
Q

IoT protocols. also a popular communications method for IoT Devices including connected cards, retail machines, sensors and others. 4G and 5G are used

A

Cellular Communications

58
Q
  • focuses on ensuring consistent and effective approach to the management of information security incidents including communication on security events and weakness
A

ISO/IEC 27002:2013 - Information security incident management

59
Q
  • is and adverse event that threatens business security and or disrupt services. Is related to loss of CIA (confidentiality, integrity and availability)
A

Cybersecurity Incident

60
Q
  • broad terms that describes situation in which security devices triggers alarm but there is no malicious activtiy on an actual attack taking place
A

False positive

61
Q
  • terms used to described a network intrusion devices inablitiy to detect true security events. in other words a malicious activity that is not detected by the security devices
A

False negative

62
Q
  • successful identifications of security attack or malicious event
A

True positive

63
Q
  • when intrusion detection devices identifies an activity acceptable behavior and activity that is actually acceptable
A

True negative

64
Q
  • when attacker evades the IPS box by sending fragmented packets
A

fragmentation

65
Q
  • when attacker uses techniques that use low bandwidth or very small number of packets in order to evade the system
A

low-bandwidth attacks

66
Q
  • using spoofed ip address or sources. as well as using intermediary system such as proxies to evade inspections
A

address spoofing/proxying

67
Q

attackers may use polymorphic techniques to create unique attack patters

A

pattern change evasion

68
Q

attacker can use encryption to hide their communication and information

A

Encryption

69
Q

NIST Major phases of incident response

A

Preparation
Detection and analysis
Containment, eradication and recovery
Post-incident activity (postmortem)

70
Q

Computer Security Incident Handling Guide

A

NIST SP 800-61 Revision 2

71
Q

Is an industry standard maintained by the forum incident response and security teams (first) that is used by many PSIRT to convey information about the severity of vulnerabilities they disclose to their customers

A

CVSS (Common vulnerability scoring system)

72
Q

Designed to protect confidentiality, integrity and availability of data within the confines of an organization

A

Information Security

73
Q

The process of protecting information by preventing, detecting and responding to attacks

A

Cybersecurity

74
Q

referred to as the knowledge about an existing or emerging threat to assets including networks and system

A

Threat Intelligence

75
Q

An express language designed for sharing of cyberattack information

A

STIX (Structured Threat Information Expression)

76
Q

An open transport mechanism that standardises the automated exchange of cyber-threat information

A

TAXII (Trusted Automated Exchange of Indicator Information)

77
Q

A free standardised schema for specificaiton, capture, characterization and communications of events of stateful properties that are observable in the operational domain

A

CyBOX(Cyber Observable Expression)

78
Q

An open framework for sharing threat intelligence in a machine-digestible format.

A

OpenIOC (Open indicators of compromise)

79
Q

A language for command and control of cyber-defence technologies

A

Open Command and Control (OpenC2)

80
Q

program used to combine two or more executables into single packaged program

A

wrappers

81
Q

Similar to Winzip, War and tar programs because they compress file

A

packers

82
Q

software designed to install malware payload on the victims system

A

droppers

83
Q

a program to encrypt or obscure the code

A

crypters

84
Q

an attack where an attackers tries to execute commands that he or she is not supposed to be able to execute on a system via a vulnerable application

A

command injection

85
Q

Type of SQL Injection where attacker obtains the data by using the same channel that is used to inject the SQL code

A

In-Band SQL Injection

86
Q

Type of SQL Injection where attackers retrieves data using different channel

A

Out-Band SQL Injection

87
Q

type of. SQL Injection where attackers does not make application display or transfer any data; rather the attacker is able to reconstruct the data

A

Blind SQL Injection

88
Q

3 Components of CVSS

A

Base - Temporal - Environmental Group