Vocabulary Flashcards

1
Q

What are types of Malaware?

A

Ransomware, Trojans, Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware?

A

Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Trojan

A

In computing, a Trojan horse, or trojan, is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Adware

A

Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of Social Engineering?

A

Phishing, Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Phishing

A

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of Application Attacks

A

DDOS, Cross Site Scripting, DNS Poisening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DDOS

A

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Cross site Scripting

A

Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DNS Poisening

A

DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record, e.g. an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of Wireless Attacks

A

Bluejacking, Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Bluejacking?

A

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Evil Twin

A

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of Cryptographic Attacks

A

Birthday Attacks, Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Birthday Attacks?

A

A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used to abuse communication between two or more parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Rainbow Tables?

A

A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function up to a certain length consisting of a limited set of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of Threat Actors

A

Script Kiddies, Hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Script Kiddie?

A

In programming and hacking cultures, a script kiddie, skiddie, skid or haxor is an unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Hactivists?

A

In Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Vulnerability Scanning?

A

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weaknesses of a given system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Examples of Vulnerability Scanning

A

ID-ing MisConfigurations, lack o f security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability Types?

A

Improper Input Handling, Improper Error Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is considered Improper Input Handling?

A

Improper Input Handling is the term used to describe functions such as validation, sanitization, filtering, or encoding and/or decoding of input data. Improper Input Handling is a leading cause of critical vulnerabilities that exist in today’s systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is considered Improper Error Handling

A

Improper error handling results when security mechanisms fail to deny access until it’s specifically granted. This may occur as a result of a mismatch in policy and coding practice. It may also result from code that lacks appropriate error handling logic. For example, a system may grant access until it’s denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Rootkit?

A

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound from “root” and the word “kit”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a APT attack?

A

An advanced persistent threat is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define Kill Chain?

A

The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define Reconnaissance

A

Cyber Reconnaissance can be defined as the tracking, analysing, and countering of digital and cyber security threats. This type of cyber reconnaissance or cyber intelligence is a mixture if physical espionage and defense with modern information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some various external threat actors?

A

The Lone Hacker (Black Hat / Script kiddies), Organized Cyber Crime, Nation State / Advanced Persistent Threat (APT), Hacktivists, Competitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are some various internal threat actors?

A

Inside threats are affiliated with the organization: staff, partners, stakeholders, etc.Motivations include: sabotage, revenge, financial or business gains.
nside actors are more likely to bypass technical controls, meaning strong operational and management controls are needed to mitigate threats, such as:
– Comprehensive on and off-boarding
– Mandatory vacations
– User awareness / training
– Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following threat actors or threat actor groups is most likely to have the best funding to hire and sustain a group of hackers?

A

NATION STATES
Organized crime
Script kiddies
Hacktivist groups

32
Q

What are nation states?

A

Nation states have tax revenues, backing from large companies, and/or wealthy benefactors who fund malicious activities.
Well-funded, organized crime does not have the resources of an entire
nation behind them.
Script kiddies do not have any funding because they are typically young
and inexperienced and do not qualify for any backing.
Hacktivist groups might have minor funding from opposing viewpoint factions but the funding is not significant nor comparable to nation states.

33
Q

Of the several types of threat actors, which one
is a novice with little experience as a hacker?
Insider
Script kiddie
Competitor
Hacktivist groups

A

Script kiddie

34
Q
Which threat actor is most likely to be highly skilled in launching attacks involving advanced persistent threats (APTs) against targets?
Script kiddie
Nation state
Insider
Organized crime
A

Nation state

Extended Explanation
A nation state has the most sophisticated and highly skilled hackers available for launching APTs.
A script kiddies is not highly skilled nor capable of launching APTs
against targets.
An insider can be highly skilled but does not use APTs because it would give away their positions and intent.
Organized crime rings are highly skilled but they do not launch APTs against a target.

35
Q
A group known as “Takedown” hacked into your political action committee website and defaced it. Which type of threat actor is most likely responsible for the attack?
Hacktivist
Script kiddie
Competitor
Insider
A

Hacktivist

“Takedown” is a hacktivist group. Its motivations seem political and it is interested in defacing websites of those who have opposing viewpoints from their own.
Script kiddies typically do not deface websites, but instead use scripts and applications to break into systems or applications with known vulnerabilities.
Although a malicious insider might have the ability to deface the site, it’s unlikely they would do so. Insiders usually exfiltrate data rather than deface sites.
It’s unlikely that a competitor would deface the site. They’d more likely look for a list of donors or other sensitive information

36
Q

What aspect of cybercrime often motivates script kiddies to hack into systems or into a company?
Confidential company information
Financial motivation and ability to sell information
Collaboration with government and other agencies
Bragging rights, publicity, or other form of notoriety

A

Bragging rights, publicity, or other form of notoriety

Extended Explanation
Script kiddies generally only want to be able to tell their friends that they have hacked some company or hear their names on the news.
Script kiddies are not generally profit seekers because they do not have
the resources for acquisition or the sale of these items.
Script kiddies are not involved with government entities or agencies and therefore do not seek this type of information or activity.
Private or secret information motivates insiders to become threats.
Script kiddies do not gain profits by having access to private or
secret information.

37
Q

Which of the following motivates a hacktivist
to perpetrate a website defacing or an
informational breach?

A

Reputational damage to the target

Extended Explanation
Hacktivists are interested in damaging or exposing their ideological opposites but not generally for monetary gain or other accolades.
Hacktivists are primarily concerned with damaging the reputations of
their targets.
Hacktivists have no interest in military tactics or political upheaval.
Their interest is purely ideological.
A boost in recognition is only important to script kiddies who want to
show off to friends or rival script kiddie groups.

38
Q

What is a virus?

A

A virus is a program that copies itself onto another computer systems.
When the user runs the infected application, the virus also runs and copies itself onto other applications on the system as well.

39
Q

Viruses can cause what

A

Slowing down the host
by using up a computer’s resources, such as
CPU and RAM.

Denial of Service Attacks (DoS):
Shutting down the host
by using up all of its resources or destroying
essential files

Ransomware:
“Scrambling” data on
the host so that users can’t read it, and demanding money to “unscramble” it.

40
Q

What is a vulnerability

A

An aspect of a business that can be exploited to compromise a systems CIA.

41
Q

What is a threat

A

An actor that might exploit a vulnerability

42
Q

Define Risk

A

The possibility of losing something valueable

43
Q

What is risk analysis

A

Understanding what risks face an organization, which are most severe, and which are most likely.

44
Q

What is risk management

A

Using the results of risk analysis to create a plan for preventing likely risks.

45
Q

What is threat modeling

A

Determining which attacks an organization is most likely to experience, who is most likely to launch them, and what actions can be done to prevent them.

46
Q

What is PASTA

A

PASTA: Process for Attack Simulation & Threat Analysis

PASTA focuses on aligning considerations of business objectives with technical requirements.

47
Q

What is STRIDE

A

STRIDE: Spoofing, Tampering, Repudiation, Information Disclosure, DoS (Denial of Service), Elevation of Privilege

STRIDE focuses on identifying what can fail in the system being modeled.

48
Q

What is OWASP

A

OWASP: Open Web Application Security Project
OWASP focuses on identifying possible threats, prioritizing risks, and planning mitigation strategies. It is mainly used with web and desktop applications.

49
Q

What are the Six steps to OWASP

A
Determine assessment scope
Identify threat agents
Identify potential attacks
Identify exploitable vulnerabilities
Prioritize identified risks
Mitigate Risks
50
Q

How do you determine the scope? (OWASP)

A

List the assets under consideration, determine their value, and define objectives for your threat modeling assessment.

51
Q

How do you determine threat agents? (OWASP)

A

Determine which attackers would be interested in the relevant assets.

52
Q

How do you identify potential attacks? (OWASP)

A

Identify the attacks each agent is likely to perform.

53
Q

How do you identify exploitable vulnerabilities? (OWASP)

A

Identify the most vulnerable points in a system, how the agent will deliver the attack, and where an attack is most likely to occur.

54
Q

What is Qualitative Analysis?

A

Evaluating risk based on intangible, unmeasurable factors.
Used when analysis leads to decisions without the need of cost-benefit analysis.Used when a complex evaluation of cost vs. benefit is unnecessary.

55
Q

What is Quantitative Analysis?

A

Evaluating each risk based on its measured likelihood and impact.
Likelihood: The probability an event will take place.
Impact: The measure of damage done if a risk takes place.

56
Q

What is exposure factor?

A

how much of an asset will be affected in the event of a breach.

57
Q

Define asset value

A

how much money an asset is worth in currency.

58
Q

WHat is SLE?

A

Single Loss Expectancy-Estimated cost of the risk occurring on a given asset.
SLE = AVE x EF

59
Q

What is AV?

A

AV = Asset Value

60
Q

What is EF?

A

EF = Exposure Factor

61
Q

What is ARO?

A

Annual Rate of Occurrence.

Estimated number of times the risk is likely to occur in a given year.

62
Q

What is ALE?

A

Annual Loss of Expectancy

ALE = SLE x ARO

63
Q

Define Governance

A

Codifying and enforcing proper behavior and operations. That is, establishing standards of “right” and “wrong,” and enforcing those standards.

64
Q

Define compliance

A

Enforcing the policies in order to meet those standards.

65
Q

What is Governance Framework?

A

defines the policies an organization must have in place.
Governance frameworks must comply with these frameworks in order to remain compliant with federal regulations and industry standards.

66
Q

What is GDPR

A

European Union Standard

67
Q

What is PCI

A

Card Processing standard

68
Q

What is Rule 30 of Regulation S-P (Safeguard Rule)

A

Mandated organizations to establish written policies and procedures designed to protect pi

69
Q

What is GDPR?

A

General Data Protection Regulation -protects the private data of all citizens of the EU and EEA

70
Q

What is the EU

A

European Union

71
Q

What is the EEA

A

European Economic Area

72
Q

What is HIPPA

A

Health Insurance Portability Accountability Act -mandates protection of medical information

73
Q

What is PCI DSS

A

Payment Card Industry Data Security Standard -requires that companies handling credit card transactions do so securely

74
Q

What is National Provider Identifier Standard:

A

Requires all healthcare entities (people, healthcare providers, health plans, and employers) to have an ID, called the National Provider Identifier (NID).

75
Q

Transactions and Code Set Standard:

A

Standardizes health insurance claims

76
Q

Define Incremental Backup

A

ncremental backups are completed after a full backup is performed on a system, only capturing what has changed since the last incremental backup.

77
Q

What is BCP and DR

A

Business Continuity Planning and Disaster Relief