Teacher Highlights Flashcards
The model Microsoft uses for threat analysis and identification is called ___.
STRIDE
What does STRIDE stand for?
- Spoofing
- Tampering
- Repudiation
- Information disclosure
- Denial of Service
- Elevation of privilege
What is spoofing?
Pretending to be something or someone other than yourself.
What is tampering?
Modifying something on a disk, network, memory, or elsewhere.
What is repudiation?
Claiming you didn’t do something or were not responsible.
What is information disclosure?
Providing information to someone not authorized to have it
What is denial of service?
Exhausting resources needed to provide services to the user
What is elevation of privilege?
Allowing someone to do something they are not authorized to do.
A ____ is an aggregation of compromised computers, turning them into robots used by attackers.
botnet
What are the three types of network attacks?
Denial of Service, Distributed Denial of Service, Unauthorized Access
The following describes which network attack?
__ __ __ attacks are probably the nastiest, and most difficult to address. They are very easy to launch and often difficult (sometimes impossible) to track because of their timing. The intent is to send
more requests to a machine than it can handle, disrupting or even totally blocking user services.
Denial of Service
While a standard DoS attack comes from one computer, a __ __ __ __ attack, involves multiple computers sending requests, and is usually performed by a botnet.
Distributed Denial of Service
When it comes to Executing Commands Illicitly, there are two main classifications of users and their system access capability:
user access and administrator access
When it comes to Destructive Behavior, there are two major categories of break-ins and attacks:
Data Diddling and Data Destruction
___ ___ occurs when an attacker makes small changes or entries in records to change the original meaning. It is a form of computer fraud involving the intentional falsification of numbers in data entry.
Data Diddling
The term ___ ___ can be defined as the process of destroying the data stored on tapes, hard disks, and other forms of electronic media so that it is completely unreadable.
Data Destruction
___ is a non-technical or low-technology confidence trick (“con”) used for attacking information systems, often involving trickery or fraud.
Social Engineering
What are the two different types of phishing?
Spear Phishing and Whaling
___ ___ is a type of phishing that targets a specific group of individuals by sending messages that appeal to the group. Phishers may identify their targets by name using information collected from public sources such as social media.
Spear Phishing
___ is a specific form of spear phishing targeted at high-value individuals, such as a CEO or company board member. This type of target provides an especially high payoff for potential attackers
due to the type and amount of information they have access to.
Whaling
___ techniques attempt to acquire sensitive data, such as bank account numbers, passwords, email accounts, etc., through fraudulent solicitation via email, text messages, or websites. A perpetrator masquerades as a legitimate business or reputable person, often broadcasting messages to a wide audience of targets or individuals within an organization or otherwise. Imagine a fisherman casting a line into the water with a baited hook waiting for a victim to bite.
Phishing
___ tricks a victim by using their curiosity or greed against them. It encourages any user who happens to come across the bait to perform some action to trigger a trap, such as installing malware onto a device.
Baiting
Software is considered ___ because of the perceived intent of the creator rather than any features of the software itself.
malware
A ___ ___ is a type of virus planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs, such as a specific date.
logic bomb
___ is a type of malware that prevents or limits users from accessing their system. Attackers can encrypt a victim’s entire system, specific files, or they may lock the system’s screen until the victim pays a specified ransom to have their data unencrypted or unlocked by the attacker.
Ransomware
___ software is your system’s protection against viruses. Your system can contract viruses from websites, e-mail attachments, etc. ___ programs inspect the contents of each file. They search for a virus signature, that is, specific patterns that match a malicious profile of something known to be harmful. For each file that matches a signature, the ___ program provides options on how to respond, such as removing the offending patterns, quarantining the file, or deleting the file.
Anti-virus
When it comes to countermeasures, what are the steps of the response phase of an attack?
Tasks such as defining the attack, informing users of the attack, contain the intrusion, identifying the source, notifying all interested parties (to include legal authorities), and compiling detailed repair reports for the entire affected system
___ ___ ___ refers to efforts to enhance the security of the supply chain, the transport and logistics system for the cargo. It combines traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft.
Supply chain security