Week 6 - Cyber Security/Ethical Hacking Flashcards
What is an Asset, Vulnerability and Threat?
Asset
- Anything that has value to the organisation and needs protection
Vulnerability
- a weakness of an asset or group of assets that may be exploited
Threat
- Cause of harm
- Can be intentional, accidental or environmental (power cut)
Types of hackers
White Hat
- Ethical or pen testers etc
Black Hat
- Personal gain
Grey Hat
- Look for vulnerabilities without permission. Will report to owner sometimes for small fee. If not responded to then they may post the exploit online
Give two models of Info Sec
CIA - Overall security
CAIN - Important for transport
Define confidentiality
Confidentiality is the need to ensure that information is disclosed only to those authorised to see it (SANS)
What makes privacy different from confidentiality?
Privacy refers to an individual’s desire to control who has access to his/her data
Confidentiality refers to the maintenance of a company agreement with the customer about how the customer’s identifiable data will be handled
Define profiling
The process of constructing user profiles generated by computer data analysis.
Uses techniques to allow the discovery of patterns in large data
Give threats to confidentiality
- Hackers
- SHoulder surfing
- Not disposing documents properly
- Malicious code
- Unauthorised activity
- Improper access control
Define data integrity
Guarding against improper modification and includes ensuring data repudiation and authenticity
Give some controls to protect data integrity
- Digital signatures
- File integrity verifier utilities
- Security trainign
How can you ensure availability?
- Maintenance
- Backups
- Redundancy
- Cloud Computing
Define DDOS in the context of security
Distributed Denial of Service is a distributed version of a Denial of Service attack.
The aim is to make a service unavailable to its legitimate users.
See the Team Lizard gaming console christmas attacks in 2014
Give types of flooding attacks
- ICMP flood - ICMP packets
- UDP Flood
- TCP SYN flood (connection requests)
What is a smurf attack
A way of generating a lot of traffic:
- Sends a large amount of ping traffic with spoofed source IPs.
- If the routing device delivering traffic to those addresses delivers the IP broadcast to all hosts, most hosts on that net will take the ICMP echo request and reply to it, multiplying the traffic by the num of hosts responding
Virus vs Worm vs Trojan Horse
Virus is a program that attaches itself to files and replicates
Worms are independent and can spread without the help of other programs.
Trojan horses are programs that look legit but contain malicious code.
How to defend against DDOS pre attack?
- Enforce policy for resource consumption
- Provide backup resource on demand
- Turn off all unnecessary services of the web server
How to defend against DDOS during attack?
Try to detect the attack at the beginning by looking for suspicious patterns of behaviour
How to defend against DDOS post attack?
Identify the source and prevent future attacks from it
What is a network scanner?
Network scanners check for vulnerabilities on your own system but can also check from outside the system.
Can therefore be used maliciously
What is code injection?
Code injection is where hackers exploit vulnerable web code to run commands.
EG SQL injection is most frequent, or PHP injection where there is user input
Give some of the acts that relate to hacking
COmputer Misuse Act 1990 Police and Justice Act 2006 Serious Crime Act 2015 EU Directive 2013/40/EU Terrorism Act 2000 Telecoms Regulations 2000 GDPR 2018
What are the offences in the computer misuse act 1990?
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate further offences
- Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer
Give the penalty for unauthorised access only
Up to six months in prison and/or an up to £5k fine
Give the penalty for unauthorised access with intent to commit a further crime or modification of data
Up to 5 year prison and/or unlimited fine
Give the penalty for making, supplying or obtaining anything which can be used for computer misuse offences
Up to 10 year prison sentence and/or an unlimited fine
According to the NCSC, define penetration testing?
“penetration testing is a method for gaining assurance in the security of an
IT system by attempting to breach some or all of that system’s security,
using the same tools and techniques as an adversary might.”
What is threat modelling?
The process of thinking about how an adversary would attack a system based upon techniques of different threat actors
Give potential threat actors
Cyber Criminals
State attackers
Insiders
Hacktivists
Whitebox vs Blackbox testing
White Box Testing
- Full information about the target is shared. Reaffirms confidence in internal threat management
Black Box Testing
- No information is shared with the testers and emulates a hacker’s perspective on the system
Give the steps of pen testing
Reconnaissance Scanning Gaining Access Maintaining Access Covering tracks
Define reconnaissance
Information Gathering
What is the scanning step?
Actively probing a system to find what is attackable.
eg entry points
Goal: Obtain a network map and find vulnerabilities
Give the advantages of a firewall
- defines a single access point, easy to control
- protection from network scanners
- used to implement virtual private networks
What is an IDS?
Intrusion Detection System
Software that scans the computer as it runs, alerting of any signs of break in or suspicious activity