Threats, Vulnerabilities and Mitigations 2.1-2.2 Flashcards

1
Q

Threat Vectors

A

Method used by the attacker to infect or gain access to the target.
A lot of work goes into finding vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Places where malicious code can be stored.

A

An adobe PDF file,
ZIP/RAR files
Microsoft office - Marcos within documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Voice call vectors

A

Vishing - phising over the phone
Scam over IP - Large scale phone calls
War dialling
Call tampering - Disrupting phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Removable device vectors

A

USB - helps to get into an air gapped network. (No connection to a network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attributes of threat actors

A
  • Internal/External
  • Resources/funding
  • Level of Sophistication/Capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motivations of threat actors

A
  • Data exfiltration
    -Espionage
    -Service disruption
    -Blackmail
    -Financial gain
    -Philosophical/Politcal Beliefs
    -Ethical
    -Revenge
  • Chaos
    -War
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Motivations for a nation state to act as a threat actor

A

Motivations:
Data exfiltration
Philosophical
Revenge
Disruption
War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resources and Sophistication of nation states acting as a threat actor?

A

Commonly an Advanced Persistent threat (APT)
Has massive resources, are highly sophisticated.
Example: Stuxnet Worm - destroy nuclear centrifuges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unskilled attackers

A

Run pre-made scripted without any knowledge of whats really happening. Motivated by the hunt. Can be internal or external, Not very Sophisticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacktivist

A

A hacker with a purpose, motivated by philosophy, revenge disruption, etc.
Funding may be limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insider threat

A

Extensive resources - using the organisations resources against themselves
An internal entity -
Medium level of sophistication - insider has very specific knowledge which can be directed at vulnerable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organised Crime

A

Professional Criminals - Motivated by making money
Very Sophisticated
lots of capital to fund hacking activities
May have corporate structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Shadow IT

A

Going rogue within the the existing organisation. Working around the internal IT organisation
Builds their own infrastructure.
Limited Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Message based vectors

A

Email
Sms
Phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Image based vectors

A

Images which contain malicious code within them, less easy to identify the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vulnerable client software vector

A

Infected executable
Known or unknown vulnerability
May require constant updates.

14
Q

Vulnerable agent software vectors

A

No installed executable
Compromised software on the server would affect all users
Attacker can distribute this easily because each new connection to this server runs a new instance ach time.

15
Q

Unsupported System Vectors

A

Patching is an important prevention tool.
Unsupported systems may not have patching options because they are outdated and the manufacturer doesn’t provide updates

15
Q

Unsecure network vectors

A

Wireless outdated security protocols such as WEP, WPA, WPA2
Wired or wireless unsecure interfaces can be made more secure with 802.1x which will prevent connection without credentials
Bluetooth can be used bt a threat actor for reconnaissance.

16
Q

Phishing

A

Social engineering which methods which is designed to make people think something is real when it is not. (example: a URL which takes you to a fake website which looks like a real one)

17
Q

Phishing Tricks and misdirection

A
  • Typosquating Misdirection
    -Pretexting - Lying to get information
    -Vishing (Voice Phishing)
    -Smishing (SMS Phishing).
18
Q

Impersonation

A

Attacker pretends to be someone they aren’t.
Attack the victim as someone higher in rank
Throw tons of technical details

19
Q

Identity Fruad

A

Credit Card Fraud
Bank Fraud
Loan Fraud
Government benefits fraud

20
Q

How to protect against impersonation

A

Never volunteer information
Don’t disclose personal details
Always verify before revealing info
Verification should be encouraged.

21
Q
A
22
Q

Open service Ports ?

A

Most network-based services connect over a TCP or a UDP port

Threat actors can access systems via to open ports

23
Q

Supply chain threat vector

A

Threat Actors can tamper with the underlying infrastructure during the manufacturing process before it is in installed.

MSP -Managed service provider (attackers can target the MSP)

24
Q

Phishing

A

Social Engineering to trick people into believing a fake scam to get information from them.,

Often delivered by email, text

25
Q

Methods tricks and misdirection used by attackers

A

Typosquatting - URL hijacking
Prextexting - Lying to get information
Vishing (Voice Phishing)
Smishing (SMS phishing)

26
Q

Impersonation

A

Attackers pretend to be someone they aren’t
Use some of those details from reconnaissance
attack the victim as a higher rank

27
Q

Identity fraud

A

Your identity can be stolen by others
Credit card fraud
Bank fraud
Loan Fraud
Government benefit fraud

28
Q

How to protect against impersonation

A

Never volunteer information
Don’t disclose personal details
Always verify before revealing info
Verification should be encouraged.

29
Q

Waterhole attack

A

Attacker will put malicious or infectious software on a website or software that the victim group uses and waits for them to visit the website.

30
Q

How to defend against a watering hole attack

A

Layered defence, Firewalls and IPS (Stop the network traffic before things get bad).

31
Q

Other social networking technique

A

Misinformation/Disinformation
- Disseminate factually incorrect information
-Influence campaigns
-Nation-state actors
Advertising is an option

32
Q
A