Week 2 Flashcards
What is a threat vector?
A pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.
What is an attack surface?
Number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data.
- Compromised Credentials
- Malware
- Phishing
Above are common attack vectors, list 4 more
- Insider Threats
- Missing or Weak Encryption
- Unpatched Applications or Servers
- Distributed Denial of Service (DDoS)
How do organizations minimize the attack surface?
By identifying and blocking potential threats and updating default credentials.
True or False: Users are considered the weakest link in cybersecurity.
True
What are the two categories of threat vectors?
- Programming
- Social Engineering
Fill in the blank: A hacker gains access to a system through an attack vector by identifying potential _______.
[target]
What is the significance of monitoring the attack surface?
It helps organizations identify and block potential threats.
- Viruses/Trojans
- Malware/Ransomware
- Unpatched vulnerabilities
These fall under what category of threat vector?
Programming
- Weak passwords
- Phishing
- Messaging Apps
These fall under what category of threat vector?
Social Engineering
- Spoofing
- Credential Reuse
- Disgruntled Employee
These fall under what category of threat vector?
Social Engineering
- Brute forcing
- Dos/DDoS
- Misconfigurations
These fall under what category of threat vector?
Programming
Fill in the blank: The analysis of more than 145,000 internet-exposed Industrial Control Systems was conducted by _______.
[Censys]
What should users do in response to high-severity flaws in devices like Bosch Thermostats?
Limit the network reachability of the device and review accounts that have login access.
What percentage of internet-exposed ICS devices are located in North America?
38%
What are the two modes in which a threat vector can operate?
- Passive Mode
- Active Mode
What is the main challenge of minimizing the attack surface?
It becomes difficult as companies expand their digital footprint and embrace new technologies.
What is the expected timeline for patches for vulnerabilities in Bosch devices?
By the end of January 2024.
What is the role of email filtering tools?
They can block a lot of malicious messages.
True or False: The adoption of self-driving vehicles has decreased the attack surface.
False
What is a common passive mode activity for hackers?
Information gathering without affecting the system.