Vocabulary Flashcards
What are types of Malaware?
Ransomware, Trojans, Adware
What is Ransomware?
Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Define Trojan
In computing, a Trojan horse, or trojan, is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Define Adware
Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
What are examples of Social Engineering?
Phishing, Vishing
Define Phishing
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication.
Examples of Application Attacks
DDOS, Cross Site Scripting, DNS Poisening
What is DDOS
In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet
Define Cross site Scripting
Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
What is DNS Poisening
DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record, e.g. an IP address
Examples of Wireless Attacks
Bluejacking, Evil Twin
What is Bluejacking?
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.
Define Evil Twin
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam.
Examples of Cryptographic Attacks
Birthday Attacks, Rainbow Tables
What are Birthday Attacks?
A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used to abuse communication between two or more parties.
What are Rainbow Tables?
A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function up to a certain length consisting of a limited set of characters.
Examples of Threat Actors
Script Kiddies, Hactivists
What is a Script Kiddie?
In programming and hacking cultures, a script kiddie, skiddie, skid or haxor is an unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites.
What is a Hactivists?
In Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
What is Vulnerability Scanning?
A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weaknesses of a given system.
Examples of Vulnerability Scanning
ID-ing MisConfigurations, lack o f security controls
Vulnerability Types?
Improper Input Handling, Improper Error Handling
What is considered Improper Input Handling?
Improper Input Handling is the term used to describe functions such as validation, sanitization, filtering, or encoding and/or decoding of input data. Improper Input Handling is a leading cause of critical vulnerabilities that exist in today’s systems and applications.
What is considered Improper Error Handling
Improper error handling results when security mechanisms fail to deny access until it’s specifically granted. This may occur as a result of a mismatch in policy and coding practice. It may also result from code that lacks appropriate error handling logic. For example, a system may grant access until it’s denied.
What is a Rootkit?
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound from “root” and the word “kit”.
What is a APT attack?
An advanced persistent threat is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
Define Kill Chain?
The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.
Define Reconnaissance
Cyber Reconnaissance can be defined as the tracking, analysing, and countering of digital and cyber security threats. This type of cyber reconnaissance or cyber intelligence is a mixture if physical espionage and defense with modern information technology.
What are some various external threat actors?
The Lone Hacker (Black Hat / Script kiddies), Organized Cyber Crime, Nation State / Advanced Persistent Threat (APT), Hacktivists, Competitor
What are some various internal threat actors?
Inside threats are affiliated with the organization: staff, partners, stakeholders, etc.Motivations include: sabotage, revenge, financial or business gains.
nside actors are more likely to bypass technical controls, meaning strong operational and management controls are needed to mitigate threats, such as:
– Comprehensive on and off-boarding
– Mandatory vacations
– User awareness / training
– Principle of least privilege