Threat, Vulnerabilities and Mitigations: Quiz Revision Flashcards
Which of the following network attacks has the goal of capturing a user’s login information to use in a subsequent attack?
A) Amplified
B) Credential replay
C) On-path
D) Reflected
A credential replay attack uses intercepted credentials to initiate an attack. An attacker will monitor the conversation between Benjamin and George and capture the credentials of George. Later, the attacker initiates a conversation with Benjamin. When challenged for credentials by Benjamin, the attacker supplies George’s credentials, and Benjamin allows the conversation to continue.
What is a reflected attack?
Reflected attacks are Distributed Denial of Service (DDoS) attacks. Reflected DDoS attacks used spoofed IP addresses to send excessive traffic to targets. The attacker will make multiple requests for information from a server, using the spoofed IP address of a victim. The victim is then overwhelmed with response traffic from the server.
What is a On-Path attack?
An on-path (formerly known as man-in-the-middle) attack occurs when a hacker intercepts messages from a sender, modifies those messages, and sends them to a legitimate receiver. This type of attack often involves interrupting network traffic to insert malicious code.
What is a Amplified attack?
Amplified attacks are often part of a DDoS attack, usually associated with UDP protocols. The goal of this attack is to turn a simple query, such as DNS or NTP, into a flood of responses that overwhelms the victim’s network resources
A user notifies you that a software application displays advertisements while the application is executing. Of which security threat is this an example?
A) spyware
B) virus
C) worm
D) adware
Adware is a software application that displays advertisements while the application is executing. A common example is a free mobile app that displays advertisements for other products at the bottom of the screen. Some adware is also spyware that monitors your Internet usage and personal information. Some adware will even allow credit card information theft. The application’s developer may or may not be aware that malicious ads containing spyware are being displayed through the application.
A worm is a program that spreads itself through network connections. Spyware often uses tracking cookies to collect and report on a user’s activities. Not all spyware is adware, and not all adware is spyware. The definition of spyware requires that your activities be monitored and tracked; the definition of adware requires that advertisements be displayed.
A virus is malicious software (malware) that relies upon other application programs to execute itself and infect a system. Another malware that you need to be familiar with is ransomware, which restricts access to a computer that it infects. The ransomware then demands a ransom paid to the creator of the malware for the restriction to be removed.
Which threat actor motivation is exemplified by threatening to release sensitive personally identifiable information (PII)?
A) Financial gain
B) Service disruption
C) Blackmail
D) Data exfiltration
Blackmail is most commonly accomplished by threatening to release sensitive PII or incriminating evidence regarding an individual. The cyber-criminal targets an individual who has access to certain company assets, such as data, systems, or processes, and then digs into their personal records. The cyber-criminal threatens to expose the individual unless they take some action against a company asset on the criminal’s behalf.
Remember that not all PII is sensitive. While names, addresses, gender, and dates of birth are PII, they are found in many public databases. PII also includes geo-location data, online browsing history, and medical records, which are more likely to be leveraged by a blackmailer.
What is service disruption?
Service disruption can cause damage to an organization’s reputation, or loss of public confidence in the organization. If an airline had a disruption where you could not access their services, such as booking a flight, that person would likely do business with another airline.
What is Data exfiltration?
Data exfiltration is the act of sending sensitive or proprietary information to unauthorized recipients external to the organization. Data loss prevention is designed to detect and stop data exfiltration behavior by users. If DLP software is not present, data exfiltration might only be discovered after the event. When it occurs, the best course of action is to identify the source of the disclosure, if possible, and then take disciplinary action against the user.
What is financial gain motivation?
Financial gain motivation is exemplified by activities such as fraud, ransom attacks, and theft of credit card data. Once the threat actor has your information, they can sell it or use it for fraudulent purposes. When a cyber-criminal threatens to reveal sensitive PII in exchange for money, it is termed extortion, not blackmail.
What is Espionage?
Espionage – Competition attacks are the modern version of industrial espionage. Theft of intellectual property, marketing plans, and customer lists are all examples that can have devastating effects on the targeted organization. Even stealing the victim company’s credit card list can have a severe economic impact on that company. Often, the attacking company will find a disgruntled individual in the subject company to carry out the attack.
What is Philosophical or political beliefs?
Philosophical or political beliefs – Philosophical beliefs and political beliefs are used by extremist groups to recruit members to their cause. One nation might attempt to convince citizens of another nation to perform cyberterrorist activities. Hacktivists are the typical actor here.
What are ethical motives?
Ethical motives – Ethical hackers (sometimes called white-hat hackers or penetration testers) are individuals hired by the company to test the company’s security infrastructure. Their purpose is to conduct activities to find weaknesses and “break in”. The ethical hacker will prepare a report detailing the weaknesses so that the client company can address those issues and make corrections. They may be mistaken for threat actors by the company’s in-house team during a closed penetration test.
What is revenge motivation?
Revenge – threat actors can be motivated by revenge. Revenge and retaliation result from the perception that the threat actor has been slighted by a person or organization. The threat actor wants to “teach them a lesson” or extract revenge.
What is disruption and Chaos?
Disruption/Chaos – Some threat actors simply want to cause disruption and chaos. A threat actor might be motivated to gain notoriety by claiming responsibility for a disruptive event. The end goal is to upset normal operations in an attention-getting way.
What is War motivations?
War – Civilians and nation-states can use cyberspace to advance wartime agendas. Each may be engaged in activities that disrupt a target’s communications, services, and infrastructure, or to spread propaganda, misinformation, and fear.
Which of the following supply chain elements are threat vectors? (Choose all that apply.)
A) Third-party software dependencies
B) Managed service providers
C) Hardware suppliers
D) Software suppliers
Managed service providers (MSPs), software and hardware suppliers, and third-party software dependencies are all threat vectors in the supply chain. A supply-chain attack is not an attack on a target directly, but on a more vulnerable company or resource that helps the target organization conduct its business or create a product. By infiltrating the target’s supply chain, the attackers can gain access to internal systems or data through the compromised components.
Managed Service Providers (MSPs) are highly susceptible to supply chain attacks. MSPs provide IT services to other organizations, and may have access to data from their clients. When an organization announces that they are outsourcing a certain aspect of their business, they are outsourcing to an MSP. An MSP may provide any combination of a number of services, such as help desk services, tech support, software updates, data backup, and even payroll services. When an attacker targets an MSP, they potentially have access to multiple clients of that MSP. The most well-known supply chain attack involving an MSP was the SolarWinds attack of 2020. Attackers may also disable access to a third-party managed service, as in the United Healthcare billing service attack of 2024.
Software suppliers include cloud-based SaaS providers and application vendors. Software provider vulnerabilities occur in third-party companies that provide software to other companies (customers). Attackers will look for a vulnerability within the software that the attacker can exploit. Then, when the customer installs the software, the customer’s data is exposed to the attacker, or the attacker is able to install more malicious software into the customer’s system to establish a foothold.
Third-party software dependencies refer to the external libraries, frameworks or components that integrate with an organization’s existing software or that were used to build third-party software. These external items add functionality, or perhaps assist with further development. Issues to consider with third-party software include the possibility of malicious components, lack of transparency from the vendor, and supply chain attacks on vulnerable components.
What are some the strict Audit controls to avoid supply chain attacks?
All vendors in the supply chain should be under strict audit controls. Some recommended best practices to mitigate supply-chain attacks include:
Monitor third-party service providers’ access to sensitive data.
Make an inventory of all data exposed to the supply chain.
Request source code and list of all components used to build a vendor’s software.
Include security requirements and a right-to-audit in all contracts with managed service providers, software providers, and hardware suppliers.
Use automated supply-chain management tools to continually monitor for and remediate known vulnerabilities and audit behavior.
Have a formal procedure for offboarding old vendors and removing their access to internal systems.
What are some of the hardware supply chain attacks?
Hardware provider vulnerabilities occur in device manufacturers and suppliers. A classic example is the Target breach in 2013. Target’s HVAC hardware provider was compromised, and through the HVAC provider, attackers accessed Target’s payment system and stole millions of credit card numbers from Target’s customers. Other hardware-based supply chain attacks could include:
Selling counterfeit equipment through an unauthorized channel
Tampering with legitimate equipment before it is delivered to the target
Using uncertified third-party components while manufacturing the hardware
Allowing off-site personnel to install hardware without supervision
To mitigate these risks, organizations should only buy hardware from authorized resellers or the manufacturer, inspect hardware for signs of tampering, supervise vendor personnel during equipment installation, and request vendors certify the hardware and its components.
Which of the following malware attacks is actually a collection of unwanted or unnecessary programs installed on a system?
A) Keylogger
B) Bloatware
C) Rootkit
D) Trojan
Bloatware is an umbrella term for all the extra (and usually unwanted) applications that are installed on systems by the manufacturers. Many of these extra applications are harmless, and some of these applications may be bundled in a zip file. When you install from the zip file, you also install all the extra applications which may include things like browser hijackers, adware and even spyware.
What is a keylogger?
Keyloggers capture the keystrokes made on the keyboard and send them to the attacker. The keylogger can be a physical device, it is more often a software application. The keylogger records the keystrokes made by the users as a file, which can be transmitted in real time or at a time of the attacker’s choosing.
What is a Trojan?
A Trojan is malware, malicious content that looks to be something beneficial or legitimate. The user is tricked into downloading and installing the content, or clicking on a link that is actually an executable. The name “Trojan” comes from the ancient Greek story of the Trojan Horse.
What is a rootkit?
A rootkit is a type of malware that allows attackers to have administrative access through a backdoor. Once an attacker has gained access, the rootkit may have the capability of erasing its tracks. Rootkits are particularly dangerous, since the administrative access allows the attacker to change system-level files including the Registry.
You have several independent security monitoring solutions, each with different logging mechanisms. You are concerned that they are not working well together, and that the separate logs may not present all the necessary information. In addition, the costs of maintaining the separate products are rising. You need to provide a centralized solution that will include centralized logging. What could you replace them with?
A) Patch management tools
B) Host-based firewall
C) DLP
D) UTM
Unified Threat Management (UTM) incorporates several threat management devices and systems into one appliance. The biggest advantage to a UTM from an analysis standpoint is that all the logs are in one place, as opposed to checking multiple systems. In addition, a UTM would cut down on the costs associated with maintaining separate products.
What are HIPS and HIDS used for?
HIDSs and HIPSs have two different functions. Host-based Intrusion Detection Systems (HIDS) will provide an alert in the event of a breach on a single server or computer. Host-based Intrusion prevention systems (HIPS) will go a step further and stop the attack. An example would be shutting down port 80 when http traffic exceeds the baseline norm. With either product, it would be important to view the log entries generated, and interpret the results based on documentation provided by the HIPS/HIDS vendor. A host-based system will not monitor network traffic for threats.