Udemy Sections 1-3: Overview, Malware, and Malware Infections Flashcards
The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction
Information security
The act of protecting the systems that hold and process critical data
Information systems security
CIA stands for
Confidentiality, Integrity, Availability
Information has not been disclosed to unauthorized people
Confidentiality
Information has not been modified or altered w/out proper authorization
Integrity
Information is able to be stored, accessed, or protected at all times
Availability
When a person’s identity is established w/ proof and confirmed by a system
Authentication
AAA stands for
Authentication, Authorization, Accounting
5 methods of authentication
Something you know
Something you have
Something you are
Something you do
Somewhere you are
Occurs when a user is given access to a certain piece of data or certain areas of a building
Authorization
Tracking of data, computer usage, and network resources
Accounting
The most cost effective security control to use
User training
Hackers who find and exploit vulnerabilities before anyone else does
Elite hackers
Hackers with little to no skill who only use the tools and exploits written by others
Script kiddies
Hackers who are driven by a cause like social change, political agendas, or terrorism
Hacktivists
Hackers who are a part of a crime group that is well-funded and highly sophisticated
Organized crime
Highly trained and funded groups of hackers (often by nation states) w/ covert and open-source intelligence at their disposal
APT (Advanced Persistent Threats)
Property of an intelligence source that ensures it is up-to-date
Timeliness
Property of an intelligence source that ensures it matches the use cases intended for it
Relevancy
Property of an intelligence source that ensures it produces effective results
Accuracy
Property of an intelligence source that ensures it produces qualified statements about reliability
Confidence levels
Threat intelligence that comes as a commercial service offering, where access to updates and research is subject to a subscription fee
Proprietary
Data that is derived from the provider’s own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers’ systems, suitably anonymized
Closed-source
Data that is available to use w/out a subscription, which may include threat feeds similar to the commercial providers, and may contain reputation lists and malware signature databases
Open-source
Knowledge you can write down, see, feel, and touch
Explicit
Knowledge gained from experience
Implicit knowledge
A proactive cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring
Threat hunting
What must you assume when threat hunting?
That the existing rules you’ve put in place to prevent compromise have failed.
A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion
Kill chain
The 7 linear steps of the kill chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
C2 (command and control)
Actions on objectives
The kill chain step in which the attacker determines what methods to use to complete the phases of the attack
Reconnaissance
The kill chain step in which the attacker couples payload code that will enable access w/ exploit code that will use a vulnerability to execute on the target system. The attacker is merely writing the code; it has not yet been delivered or executed.
Weaponization
The kill chain step in which the attacker identifies a vector by which to transmit the weaponized code to the target environment
Delivery
The kill chain step in which the weaponized code is executed on the target system
Exploitation
The kill chain step in which the mechanism enables the weaponized code to run a remote access tool and achieve persistence on the target system
Installation
The kill chain step in which the weaponized code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possibly download additional tools to progress the attack
C2 (command and control)
The kill chain step in which the attacker typically uses the access they’ve achieved to covertly collect information from target systems and transfer it to a remote system (data exfiltration) or achieve other goals and motives
Actions on objectives
A method used to identify a defensive course-of-action matrix to counter the progress of an attack at each stage
Kill chain analysis
A free, open-source knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures
MITRE ATT&CK Framework
A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim.
Diamond model of intrusion analysis
The 4 core features of the Diamond model of intrusion analysis
Adversary
Capability
Infrastructure
Victim
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent
Malware
Malicious code that runs on a machine w/out the user’s knowledge and infects the computer when executed. Requires a user action to reproduce and spread.
Virus
A type of virus stored in the first sector of a hard drive and are loaded into memory upon boot up.
Difficult to detect because it is installed BEFORE the OS boots up. Requires an antivirus that specifically looks for this type of virus.
Boot sector virus