SY0-701: 2.0 (Threats, Vulnerabilities, and Mitigations) Flashcards
Vulnerability (2.3)
Any weakness in the system design or implementation (software bugs, misconfigures software. improperly protected network devices, missing security patches, lack of physical security)
Threat Actor Attributes (2.1)
Specific characteristics or properties that define and differentiate various threat actors from one another
Threat Actor (2.1)
Individual or entity responsible for incidents that impact security and data protection
Threat Actor Types (2.1)
Unskilled Attackers- baby hackers
Hacktivists- driven by cause
Organized Crime- driven by money
Nation-State Actors- cyber warfare/espionage
Insider Threats- revenge or accidental
Unskilled Attacker (2.1)
AKA Script Kiddie
Runs scripts w/ no knowledge of how it works
Hacktivist (2.1)
Individuals or groups that use their technical skills to promote a cause or drive a social change instead of for personal gain
Organized Crime (2.1)
Sophisticated and well-structured entities that leverage resources and technical skills for illicit gain
Nation-State Actor (2.1)
Highly trained and often funded by nation states/governments
Insider Threat (2.1)
Cybersecurity threats that originate from within an organization (malicious or accidental)
Threat Actor Motivations (2.1)
Data exfiltration
Espionage
Service disruption
Blackmail
Financial gain
Philosophical/political beliefs
Ethical
Revenge
Disruption/chaos
War
Threat Actor Attributes (2.1)
Internal / External
Resources / Funding (tools, skills, personnel)
Level of sophistication / Capability (technical skill, coimplexity of tools, ability to evade detection)
False Flag Attack (2.1)
Attack that is orchestrated in such a way that it appears to originate from a different source or group (popular style w/ nation-state groups)
APT (2.1)
Advanced Persistent Threat- Prolonged and targeted cyber attack in which an intruder gains unauthorized access to a network and remains undetected for an extended period of time while trying to steal data or monitor network activities rather than cause immediate damage
Shadow IT (2.1)
The use of information technology systems, devices, software, applications, and services without explicit organizational approval
Threat Vector (2.2)
Method used by an attacker to access a victim’s machine (e.g. a vulnerability; messages, images, files, etc.)
Attack Surface (2.2)
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
BlueBorne (2.2)
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices or spread malware
BlueSmack (2.2)
Type of DOS attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device
Forms of Impersonation (2.2)
Impersonation
Brand Impersonation
Typosquatting
Watering Hole Attacks
Brand Impersonation (2.2)
Specific form of impersonation where an attacker pretends to represent a legitimate company or brand
Impersonation (2.2)
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Typosquatting (2.2)
A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical errors
Watering Hole Attacks (2.2)
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
Pretexting (2.2)
Technique where an attacker provides some information that seems true in an attempt to get the victim to provide more information
Phishing Attack Types (2.2)
Phishing
Vishing
Smishing
Whaling
Spear Phishing
Business Email Compromise
Phishing (2.2)
Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers
Vishing (2.2)
Voice Phishing- Phone-based attack in which the attacker deceives victims into divulging personal or financial information
Smishing (2.2)
SMS Phishing- Attack that uses text messages to deceive individuals into sharing their personal information
Whaling (2.2)
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
Spear Phishing (2.2)
Phishing with a more tightly focused group of individuals or organizations
Business Email Compromise (BEC) (2.2)
Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker
Identity Theft (2.2)
When attackers tries to fully assume the identity of their victim
Identity Fraud (2.2)
e.g. Attacker takes the victims credit card number and makes charges
Scam (2.2)
A fraudulent or deceptive act or operation
Invoice Scam (2.2)
A scam in which a person is tricked into paying for a fake invoice for a service or product that they did not order
Misinformation (2.2)
Inaccurate information shared unintentionally
Disinformation (2.2)
Intentional spread of false information to deceive or mislead
Attack Vector (2.4)
A means by which an attacker gains access to a computer to infect the system with malware
Malware (2.4)
Malicious Software (Viruses, trojans, worms, etc.)
Virus (2.4)
Malicious code that’s run on a machine without the user’s knowledge
*requires user actions to reproduce and spread
Virus Types (2.4)
Boot Sector
Macro
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armored
Hoax
Boot Sector Virus (2.4)
Stored in the first sector of a hard drive and loaded into memory upon boot up
Macro Virus (2.4)
Allows virus to be embedded w/i another document (Word Doc, Spreadsheet, etc.)
Program Virus (2.4)
Infect an executable or application file
Multipartite Virus (2.4)
Combination of a boot sector virus and program virus; first attaches itself to the boot sector and system files before attacking other files
Encrypted Virus (2.4)
Uses cipher to encrypt its contents in an attempt to hide from antivirus
Polymorphic Virus (2.4)
Advanced version of an encrypted virus; changes itself every time it is executed by altering the decryption module in an attempt to hide from antivirus
Metamorphic Virus (2.4)
Advanced version of Polymorphic Virus; is able to rewrite itself entirely before it attempts to infect a file
Stealth Virus (2.4)
A way viruses protect themselves
Armored Virus (2.4)
Has a layer of protection to confuse a program or person analyzing it
Hoax Virus (2.4)
Tricks user into infecting their own machine; ““Your machine has been infected”” messages; user gets the virus if they follow instructions; form of social engineering
Worm (2.4)
Malicious software that is able to replicate and spread without any user interaction; cause disruption to normal network traffic and computing activities
Trojan (2.4)
Malicious software which is disguised as harmless or desirable software; will usually provide desirable function as well as malicious one
RAT (2.4)
Remote Access Trojan: trojan which gives attacker remote access to machine; most common type of trojan
Ransomware (2.4)
Encrypts users files and provides instructions for payment to decrypt files
Spyware (2.4)
Secretly gathers information about user w/o their consent; may include keylogger
Adware (2.4)
Type of spyware which displays ads based on info collected while collecting data w/o consent
Grayware (2.4)
Also known as Jokeware; Causes improper system behavior w/o serious consequences (eg crazymouse)
Botnet (2.4)
Network of compromised computers or devices controlled remotely by malicious actors; Allows attacker to use the devices processing power, memory etc. for nefarious purposes
Zombie (2.4)
A compromised computer or device that is part of a botnet and used to perform tasks using remote commands
Command and Control Node (2.4)
AKA C2 Node- Responsible for managing and coordinating the activities of other nodes or devices within a network
Rootkit (2.4)
Designed to gain administrative level control on computer system w/o being detected; typically uses method called DLL Injection or Driver Manipulation
DLL Injection (2.4)
Malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries which are loaded at runtime
Driver Manipulation (2.4)
Compromises the kernel-mode device drivers which operate at a privileged or system level
Shim (2.4)
Code placed between two components to intercept calls and redirect them; similar concept as man in the middle
Spam (2.4)
Abuse of electronic messaging systems; usually email, texts, etc.; usually just annoying but can be dangerous if malicious code is embedded in messages
CAN-SPAM Act of 2003 (2.4)
Controlling the Assault of Non-solicited Pornography And Marketing; 1st national standards for sending commercial emails
Spim (2.4)
Spam over instant messaging; text messages, chat rooms, etc.
Backdoor (2.4)
Used to bypass the normal security and authentication functions
Easter Egg (2.4)
Unsecure coding practice that was used by programmers to provide a joke or a gag gift to the users
Logic Bomb (2.4)
Malicious code that’s inserted into a program and will only execute when certain conditions have been met
Keylogger (2.4)
Piece of software or hardware that records every single keystroke that is made on a computer or mobile device
Fileless Malware (2.4)
Used to create a process in the system memory without relying on the local file system on the infected host
Dropper (2.4)
Initiates or runs other malware forms within a payload on an infected host
Downloader (2.4)
Retrieves additional tools post the initial infection facilitated by a dropper
Shellcode (2.4)
Encompasses lightweight code meant to execute an exploit on a given target
Concealment (2.4)
Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasing log files, and hiding any evidence of malicious activities
Living of the Land (2.4)
A strategy adopted by many APTs and criminal organizations
The threat actors try to exploit the standard system tools to perform intrusions
Indications of Malware Attacks (2.4)
Account lockout
Concurrent session usage
Blocked content
Impossible travel
Resource consumption
Resource inaccessibility
Out-of-cycle logging
Missing logs
Published or documented attacks
Account lockout (2.4)
User’s unable to access accounts due to login attempts
Concurrent session usage (2.4)
User’s having multiple concurrent/simultaneous sessions
Blocked content (2.4)
Increase in blocked content notices from security tools
Impossible travel (2.4)
User’s account is accessed from two different geographic locations in an impossible amount of time
Resource consumption (2.4)
System slowdowns for unidentified reasons
Resource inaccessibility (2.4)
Inability to access resources such as files or systems