StudyGuide Flashcards
Name the three components to the collection of resources known as the World Wide Web distinguished by the way that the resources are accessed and indexed.
HTML, HTTP, URLs
Define the visible web
Is a collection of resources accessible through HTTP and compatible protocols with index search engines.
Define the deep web
Is a invisible result: its inaccessibility by search engines, and its a part internet that is not indexed by search engines. (Normally behind paywalls)
Define the Dark Web
Designed to be conceal from search engines and casual web uses (only through anonymity) services such as Tor or I2P
Name one dark web domain
.onion or .garlic
Name 2 Dark Web services
TOR ( TORPROJECT.ORG)
I2P
What was the motivation behind the dark web?
COMPLETE Anonymization of information exchange on internet (encryption: sender/servers)
List two uses of the dark net that you find acceptable
Anonymity and untraceable location
Name the two technologies were critical to the operation of Silk Road
Tor and bitcoin technology
What is principle of dumb pipe?
Network providers provide equal access and pricing to all content providers and customers without regard to the nature of that content.
What is “fait-based approach” to net neutraility”?
The ability of broadband providers to self-regulate and maintain an open and neutral internet without the need for extensive government regulations.
- No bandwidth throttling
- No preferential allocation of bandwidth
- No Traffic shaping
What is evidence that there were cases of “broadband providers blocking customers from accessing the content, application or service of their choice?”
Many Cases:
T-Mobile Binge On (2015) - Throttling: reduce bandwidth resolution
Comcast and Bit Torrent (2007- US broadband p2p)
Verizon and Throttling fire Deportment (OIO)
AT&T and Facetime (unlimited data plans)
What are the three prohibition listed in the 2010 FCC Open Internet Order
No blocking,
No unreasonable Discrimination,
Transparency
What is the real reason behind broadband providers opposition to Net Neutrality as the FCC defines it.
Interferes with the ability of broadband providers to maximize corporate profits and for this reason faces strong opposition
How did the FCC change the regulations of broadband providers in 2015?
Reclassification as Title II Service Providers:
Net Neutrality Rules: No blocking, no paid prioritization, Transparency
What is regulatory capture?
Government regulatory agency, originally established to act in the public interest and regulate industries, ends up being heavily influenced or controlled by the industries or companies it is supposed to oversee.
List 1 research focus that seem reasonable to you?
- Impact of Neoliberalism on Internet Policies
- Media and Public Perception of Net Neutrality
- Historical Analysis of Internet Regulation
What was the government position on the merit of Project Truthy?
The NSF and government support weren’t in a position to detriment the “truth” of Project Truthy, though FCC chairman Ajit Pai and Fox News used deception and misinformation to fuel tribalism. (CHECK IT)
____ target of the alleged recent Russian hack on our election infrastructure?
A developer - who was selling software about voting machine hardware
Is the greater threat to the integrity of the US electron system foreign or domestic?
domestically is more potential as threat of election interference than foreign entities.
According to political scientist Dov Levin which country has interfered with the most national elections over the past 50 years.
USA
According to political scientist Dov Levin, the US and USSR/Russia interfered with what percentage of the 937 competitive national elections between 1946 and 2000?
117
Where did the Russians find the greatest impact in the 2016 election?
Trolling, Fake news/(misinformation campaigns)
What is the “Fake News phenomenon?
The widespread dissemination of false or misleading information presented as legitimate news
Provide 2 of the 3 examples of governmental use of propaganda to control global and domestic public over the past century given in the articles
Radio Free Europe (RFE)
Radio Library (RL)
China 50 cent party
According to the author, which country perfected the art of “misinformation campaigns.
USA
How many ports are potentially accessible on a modern computer?
131,072
What ports are associated with legacy NetBios API?
135, 137-139
What are the terms that IANA uses to refer to the following port ranges? 1)_________________
0-1023
Well Known
_________________1024-49151
Registered
_________________49152-65535
Dynamic/ or Private
(T / F) IANA approves ports based on the application and intended use
True
(T / F) IANA does not endorse the use of a port or service even if the application is approved.
True
(T / F) There is little or no control over the use of a registered port
True
(T / F) Registered ports are controlled by IANA whereas unregistered ports aren’t
False
(T / F) Port 445 is associated with Windows NetBios API
False
(T / F) NetBios and SMB can be disabled in the Windows Registry
True
(T / F) NetBios and SMB can be unbound from the network interface
True
(T / F) NetBios and SMB can be blocked at a network firewall.
True
(T / F) ports 135-139 are never used on Unix computers.
False
(T/F) Telnet and FTP services are relatively harmless so their ports should be left open.
False
What is the popular netizen refrain regarding trolling?
“Don’t feed the trolls”
How does the article define “online trolling”?
Practice of anonymously interrupting normal and customary information exchange in order to lure the recipient not reacting to the message
How is online trolling different from other interference technologies like signal jamming, network blocking, network filtering, etc.?
Attempts to either engage or inflame the receiver, usually through misinformation, lies, distortions, and so on
What is one of the main goals of trolling?
provoke a reaction and manipulate opinions
Trolling is a part of the Internet’s ________________ space.
negative
List two examples of pedestrian online trolling
- Shit posting
- hit and run posting
Define kakistocracy
Rules by the least competent, corrupt and mortally unfit individuals (worst or least qualified to govern)
Define pathocracy
Rule of individuals with personality disorder, psychopaths’ and narcissists: (leading authoritarian or destructive governance.
List five different types of trolling defined in the article:
1) Ad hominem Trolling:
2) Nuisance Trolling:
3) Provocation trolling
4) Snag trolling
5) Proxy Trolling:
Why is online trolling so effective at manipulating public opinion?
Very Easy to escape undetected and can cause emotional manipulation.
List and explain the 4 categories of trolling stimulus & response.
1) ~TROLL/~TROLL (ordinary exchange):
2) ~TROLL/TROLL (troll/trollop insertion):
3) TROLL/~TROLL (sucker/victim):
4) ROLL/TROLL (troll warfare):
What is the definition of a phishing attack used in the article?
Attempt to get people to click on information/website by acting as a trust-worth agent
What is the most common tactic used in phishing?
unauthorized (victim) bank, Emails- reveal won a prize
According to the article, phishing is a subset of two larger problems. What are they?
Social engineering
Identify theft
According to the article, phishing shares many characteristics with two similar techniques. Describe them?
- Pharming
- Abuse of alternate data streams.
In what year did the first phishing attack take place?
January 1996
What are the basic strategies (minimum requirements) of effective phishing according to the article?
bulk mailing tool,
standard email,
ghost (fake) website
database of email addresses
Here are five telltale signs of a phishing attack in the HTML fragment below that were discussed in class. List and briefly explain three of them.
“<x-html></x-html>
<html><p><font><a><map><area></area></map><img></img></a></a></font></p>
<p><font>Barbie Harley Davidson in 1803 in 1951
AVI </x-html>”
</font></p></html>
1) “href=http://218.1.73.124/…/e3b/></map><img” implies and insecure connection theres also “dots of laziness.”
2) SRC=cid:part1.04050500.04030901@support_id_314202457@ebay.com email is part of a html code rather than being separate
3) “color = “#FFFFF3”” font is completely white to blend with the background
The article discussed several URL obfuscation techniques. List 3.
- URL Shortening Service: bitly or TnyUrl
- Subdomain Spoofing: mimic legit domains
Unicode/ - homograph attack: Change letter to different ex) “bаnk.com” with a Cyrillic “а” instead latin.
List three examples of non-standard URL representations
(domain name)
(ip address)
(dotted octal)
Give an example of a Unicode URL exploit
get a real url → changes what the pc sees → goes to the fake website
Enter url: www.trustsite.com
pc goes: fakesite.com/fakepage.html
Give an example of how HTML can be used to conceal a URL:
Utilizing the anchor <a> tag’s attributes, specifically the “href” attribute:</a>
<a>Click here to claim your prize!</a>
Give an example of how a numeric domain tail may be used to give the appearance of a legitimate URL or an actual IP address:
- name spoofing with unicode
A: https://www.paypal-192.168.1.1.com
Give an example how bogus authentication may be used to obscure an actual URL
Bogus authentication is a technique used by malicious actors to trick users into revealing their credentials or personal information by creating fake login screens that appear legitimate.
*********
Subject: Urgent: Action Required - Account Verification
Dear [User],
We have noticed suspicious activity on your account. To secure your account, please click the following link and verify your identity.
[Verify Your Account]
https://www.bankingservices-secure.com/login
Thank you for choosing [Bank Name].
Sincerely,
[Bank Name] Support
———————————————————————-
When you hover your mouse over the link, you see that the URL displayed in the status bar is indeed www.yourbank.com/verify, reinforcing the appearance of authenticity.
However, in reality, the link doesn’t lead to your bank’s website. Instead, it directs you to a malicious website controlled by the attacker
What data was leaked in the Equifax breach?
personal data
What was the nature of the vulnerability in the Equifax hack?
vulnerability in the Apache Struts Server software
What was the specific attack vector?
The parser had incorrect exception handling during file uploads
According to Forbes Magazine, what penalties did the CEO of Equifax receive from the Board of Directors?
A “forced” retirement with a $90 million dollar payout
To what extent was information about the Struts vulnerability known before the attack?
very well known, was announced earlier in March: By many major security-breach reporting sites.
Was Equifax aware that a patch was available for the Struts vulnerability? If so how much time did they delay in applying the patch?
They were aware since March 8 2017, but didn’t apply it for THREE months
What was the educational and training background of the Equifax CIO?
Degree in Russian History
viii. What was the education and training background of the Equifax CISO?
Degree in Music Composition
Describe the “too big to fail era”?
when a company is so large their failure would hurt the economy: So, they must be supported by the government when facing failure
Are credit reporting companies held liable for data loss?
No
What was the “payload” of the SCDOR hack?
Email phish bait containing a link to online malware
Why was there no Computer Information Security Officer overlooking the Department of Revenue’s security practices.
They felt that the $100,000 salary was too expensive
(T / F) The SCDOR hack used 33 unique pieces of malware and data management utilities
T
(T / F) According to the FBI, the perpetrators of the SCDOR hack were the Chinese
F
Was the Sony hack “one of the most vicious and malicious cyberattacks that we’ve known certainly in recent history”
no,
It doesn’t even qualify for second or third tiered echelons of cyber attacks.
What did FBI Director James Comey offer in terms of justification of his accusation?
Regarding how he knew it was North Korea, he said “Trust me.”
Has there been any confirmable evidence offered by the government that identifies the source of the hack?
No
(Fill in the blank) “humans tend to be _________________________ in that they search for the simplest explanation of events consistent with their disposition, biases, and world view.”
Cognitive misers
Name three sources that state sponsors may use to obtain cyber weaponry
State sponsored agencies,
Multimillion dollar greyware market
individual hackers
When people try to attribute some crime/hack/attack/etc. to someone else, the first principle should be what?
Cui bono - (“what agendas are hidden?”)
(T / F) In general claims of cyber attribution are testable and repeatable?
F
(T / F) Evidence used for cyber attribution have to abide by the rules of evidence
F
Which of the following would be considered totally reliable network forensic data:
{IP address, MAC address}
None , both can be spoofed
Is it possible that a forensic investigator might have biometric evidence of a cybercrime
conducted by a skilled cyberwarrior? Is it likely?
It is possible, but not likely
The Payeck GPS starter interrupt system is used for what purpose?
Financing and used car dealerships can immobilize the car if payments become delinquent
The label that the author uses to describe the irrational belief in the security of a computing/network system that was not build around a robust security model.
Faith-based security
What vehicle telematics component was exploited by the FBI in operation G-Sting?
OnStar
Why did the Ninth Circuit Court rule that the Operation G-Sting convictions were illegal?
Tampering with OnStar violated the OnStar terms of service
What type of computer appliances are “never optimal for security-sensitive applications?”
RF (Radio Frequency)
What is the name of the tool developed by Samy Kamkar to run replay attacks against keyless entry systems?
OwnStar
(T / F) The use of rolling code algorithms defeat replay attacks against keyless entry systems.
T
What is Samy Kamkar’s program that offers replay attacks for RF based keyless entry systems
that use rolling codes?
RollJam
What information is in principle accessible to Black Box OBD devices?
Accelerometer, Speed, GPS
Which is more vulnerable to hacking, a modern mobile phone or an modern automobile’s computer system?
Automobile’s computer system
What is the definition of 911 swatting given in the article?
“911 swatting,” is a malicious act that involves making fraudulent 911 calls to cause emergency response teams,
The article gives 7 examples of 911 swatting. List 3 of them:
Celebrity’s swatting
Gamer swatting(targeting)
Hate swatting/ mean-spirted attacks
What is the definition of “criminal doxing” given in the article?
the act of maliciously revealing or publishing private and sensitive information about individuals (doxing) with harmful intent, potentially leading to criminal charges.
At the time of writing, how was 911 swatting typically prosecuted?
No federal statue, but state can range from misdemeanors to felonies based on incident.
In terms of ambiguous federal statutes, 911 swatting is similar to what other crime?
Domestic terrorism: “Hoax bomb threats whether true or false”
At what layer of the TCP/IP protocol does the “magic” of VoIP take place according to the article?
application layer of the TCP/IP protocol stack.
The article discusses 3 differences between VoIP and most other packet-based applications within the TCP/IP protocol suite. List 2 of them.
1) VoIP is vulnerable to spoofing, involving the manipulation of inauthentic caller IDs.
2) VoIP can be used for toll fraud because it’s a revenue-based service.
The author mentions some major deficiencies in the Truth in Caller ID Act of 2009. Name one.
it focuses on the intent of the source rather than the activity.
What were the two rules introduced by the FCC to enable law enforcement agencies to identify the source of 911 calls that took effect in 2020?
Kari’s Law and RAY BAUM’S Act (CHECK- LOOKUP)
What federal statutes relate to 911 swatting and doxing?
Kari’s Law and the Repack Airwaves Yielding Better Access (RAY BAUM’S)
What is an air gap?
A network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecure networks, such as the internet or an unsecured LAN.
What was Operation Olympic Games/Stuxnet?
Cyberattack against Iranian uranium enrichment facility at Natanz
What exactly did OOG/Stuxnet do?
Stuxnet caused damage to Iran’s nuclear program.
How did the OOG/Stuxnet attackers cross the air gap?
By using a Flame platform Autorun exploit through infected USB drives, which were carried to the Natanz facility and inserted into network computers.
Topic: Farewell to Air Gaps
What injection strategies were used?
The initial v0.5 injection was accomplished using a Flame platform Autorun exploit through infected USB drives
What was the flaw in the Windows Icon Handler within the Windows shell?
Windows shell incorrectly parses of .LNK files.
Have air gaps ever been an effective deterrent to protecting LAN-based computers?
No
What implications does OOG/Stuxnet have for IoT? For critical infrastructures?
The exploit potential of the Stuxnet family of malware extends to virtually the entire global infrastructure.
Also, critical infrastructures were built around a weak security model; they were built around no security model.
What is a zero-day exploit?
An exploitation of a software or hardware vulnerability before a developer has the opportunity to patch the vulnerability.
Who is the big player in the gray market in cyber-weapons?
The NSA
What is the US Government’s System Vulnerabilities Equities Policy and Process document?
It outlines what the government does when it discovers or purchases malware that could affect the privacy and security of its citizens.
What is the approximate going rate for a zero-day exploit?
$50,000 to $100,000
What is representative money?
A guarantee by the issuer that the money may be used as legal tender in its jurisdiction.
What is fractional-reserve banking?
System in which only a fraction of the deposits in a bank is kept on hand, or in reserve; the remainder is lend.
What is money laundering?
illegally obtained money, making it appear as if it comes from legitimate sources.
Give two examples of a money service business
- Western Union
- Check Cashing Services
List two types of traditional money exchange
- Bank Account
- Money Service Business
List two types of non-traditional money exchange systems used in money laundering
- Charities
- Hawala Networks
What did the so-called Holder Memorandum outline?
Collateral Consequences Doctrine; noncriminal settlements like deferred prosecution have become the default for banks that are “too big to jail”
The article claims that correspondent accounts, bearer shares, tax havens are inherently criminogenic. What does this mean?
It means that these things can lead to crime; they are golden opportunities for future money launderers.
Bitcoin, Litecoin, and Peercoin are examples of ____________________________
Cryptocurrencies
__________ According to the IRS, the domestic US “tax gap” in 2013? Was:
(a) $100million, (b) $1 billion, (c) $450 billion, (d) $1 trillion ??
$450 Billion
IP/TCP EXAMPLE
4500 0030 df3c 4005 8006 633f d544 d587
e4dd 47a4 0b64 0015 48f3 05b1 0000 0000
7002 2000 50b6 0000 0204 05b4 0101 0402
Fill out the following information:
What is the IP version number?
What is the IP packet header length?
What type-of-service flags are set?
What is the total length of the packet?
What is the ID number?
What IP flags are set?
What is the offset of this fragment?
What is the TTL value?
What is the embedded protocol?
What is the header checksum?
What is the SRC IPaddress?
What is the DST IP address?
What is the SRC port of the embedded header?
What is the DST port of the embedded header?
What is the sequence number?
What is the acknowledgement number?
What is the header length (offset)?
What flags are set?
What is the window size?
What is the checksum?
Is there a value for the urgent pointer?