Week 6 - Cyber Security/Ethical Hacking Flashcards
What is an Asset, Vulnerability and Threat?
Asset
- Anything that has value to the organisation and needs protection
Vulnerability
- a weakness of an asset or group of assets that may be exploited
Threat
- Cause of harm
- Can be intentional, accidental or environmental (power cut)
Types of hackers
White Hat
- Ethical or pen testers etc
Black Hat
- Personal gain
Grey Hat
- Look for vulnerabilities without permission. Will report to owner sometimes for small fee. If not responded to then they may post the exploit online
Give two models of Info Sec
CIA - Overall security
CAIN - Important for transport
Define confidentiality
Confidentiality is the need to ensure that information is disclosed only to those authorised to see it (SANS)
What makes privacy different from confidentiality?
Privacy refers to an individual’s desire to control who has access to his/her data
Confidentiality refers to the maintenance of a company agreement with the customer about how the customer’s identifiable data will be handled
Define profiling
The process of constructing user profiles generated by computer data analysis.
Uses techniques to allow the discovery of patterns in large data
Give threats to confidentiality
- Hackers
- SHoulder surfing
- Not disposing documents properly
- Malicious code
- Unauthorised activity
- Improper access control
Define data integrity
Guarding against improper modification and includes ensuring data repudiation and authenticity
Give some controls to protect data integrity
- Digital signatures
- File integrity verifier utilities
- Security trainign
How can you ensure availability?
- Maintenance
- Backups
- Redundancy
- Cloud Computing
Define DDOS in the context of security
Distributed Denial of Service is a distributed version of a Denial of Service attack.
The aim is to make a service unavailable to its legitimate users.
See the Team Lizard gaming console christmas attacks in 2014
Give types of flooding attacks
- ICMP flood - ICMP packets
- UDP Flood
- TCP SYN flood (connection requests)
What is a smurf attack
A way of generating a lot of traffic:
- Sends a large amount of ping traffic with spoofed source IPs.
- If the routing device delivering traffic to those addresses delivers the IP broadcast to all hosts, most hosts on that net will take the ICMP echo request and reply to it, multiplying the traffic by the num of hosts responding
Virus vs Worm vs Trojan Horse
Virus is a program that attaches itself to files and replicates
Worms are independent and can spread without the help of other programs.
Trojan horses are programs that look legit but contain malicious code.
How to defend against DDOS pre attack?
- Enforce policy for resource consumption
- Provide backup resource on demand
- Turn off all unnecessary services of the web server