Week 6 - Cyber Security/Ethical Hacking Flashcards

1
Q

What is an Asset, Vulnerability and Threat?

A

Asset
- Anything that has value to the organisation and needs protection

Vulnerability
- a weakness of an asset or group of assets that may be exploited

Threat

  • Cause of harm
  • Can be intentional, accidental or environmental (power cut)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of hackers

A

White Hat
- Ethical or pen testers etc

Black Hat
- Personal gain

Grey Hat
- Look for vulnerabilities without permission. Will report to owner sometimes for small fee. If not responded to then they may post the exploit online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give two models of Info Sec

A

CIA - Overall security

CAIN - Important for transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define confidentiality

A

Confidentiality is the need to ensure that information is disclosed only to those authorised to see it (SANS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes privacy different from confidentiality?

A

Privacy refers to an individual’s desire to control who has access to his/her data

Confidentiality refers to the maintenance of a company agreement with the customer about how the customer’s identifiable data will be handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define profiling

A

The process of constructing user profiles generated by computer data analysis.

Uses techniques to allow the discovery of patterns in large data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give threats to confidentiality

A
  • Hackers
  • SHoulder surfing
  • Not disposing documents properly
  • Malicious code
  • Unauthorised activity
  • Improper access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define data integrity

A

Guarding against improper modification and includes ensuring data repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give some controls to protect data integrity

A
  • Digital signatures
  • File integrity verifier utilities
  • Security trainign
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you ensure availability?

A
  • Maintenance
  • Backups
  • Redundancy
  • Cloud Computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define DDOS in the context of security

A

Distributed Denial of Service is a distributed version of a Denial of Service attack.

The aim is to make a service unavailable to its legitimate users.

See the Team Lizard gaming console christmas attacks in 2014

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give types of flooding attacks

A
  1. ICMP flood - ICMP packets
  2. UDP Flood
  3. TCP SYN flood (connection requests)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a smurf attack

A

A way of generating a lot of traffic:

  • Sends a large amount of ping traffic with spoofed source IPs.
  • If the routing device delivering traffic to those addresses delivers the IP broadcast to all hosts, most hosts on that net will take the ICMP echo request and reply to it, multiplying the traffic by the num of hosts responding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus vs Worm vs Trojan Horse

A

Virus is a program that attaches itself to files and replicates

Worms are independent and can spread without the help of other programs.

Trojan horses are programs that look legit but contain malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to defend against DDOS pre attack?

A
  • Enforce policy for resource consumption
  • Provide backup resource on demand
  • Turn off all unnecessary services of the web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to defend against DDOS during attack?

A

Try to detect the attack at the beginning by looking for suspicious patterns of behaviour

17
Q

How to defend against DDOS post attack?

A

Identify the source and prevent future attacks from it

18
Q

What is a network scanner?

A

Network scanners check for vulnerabilities on your own system but can also check from outside the system.

Can therefore be used maliciously

19
Q

What is code injection?

A

Code injection is where hackers exploit vulnerable web code to run commands.

EG SQL injection is most frequent, or PHP injection where there is user input

20
Q

Give some of the acts that relate to hacking

A
COmputer Misuse Act 1990
Police and Justice Act 2006
Serious Crime Act 2015
EU Directive 2013/40/EU
Terrorism Act 2000
Telecoms Regulations 2000
GDPR 2018
21
Q

What are the offences in the computer misuse act 1990?

A
  • Unauthorised access to computer material
  • Unauthorised access with intent to commit or facilitate further offences
  • Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer
22
Q

Give the penalty for unauthorised access only

A

Up to six months in prison and/or an up to £5k fine

23
Q

Give the penalty for unauthorised access with intent to commit a further crime or modification of data

A

Up to 5 year prison and/or unlimited fine

24
Q

Give the penalty for making, supplying or obtaining anything which can be used for computer misuse offences

A

Up to 10 year prison sentence and/or an unlimited fine

25
Q

According to the NCSC, define penetration testing?

A

“penetration testing is a method for gaining assurance in the security of an
IT system by attempting to breach some or all of that system’s security,
using the same tools and techniques as an adversary might.”

26
Q

What is threat modelling?

A

The process of thinking about how an adversary would attack a system based upon techniques of different threat actors

27
Q

Give potential threat actors

A

Cyber Criminals
State attackers
Insiders
Hacktivists

28
Q

Whitebox vs Blackbox testing

A

White Box Testing
- Full information about the target is shared. Reaffirms confidence in internal threat management

Black Box Testing
- No information is shared with the testers and emulates a hacker’s perspective on the system

29
Q

Give the steps of pen testing

A
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering tracks
30
Q

Define reconnaissance

A

Information Gathering

31
Q

What is the scanning step?

A

Actively probing a system to find what is attackable.

eg entry points

Goal: Obtain a network map and find vulnerabilities

32
Q

Give the advantages of a firewall

A
  • defines a single access point, easy to control
  • protection from network scanners
  • used to implement virtual private networks
33
Q

What is an IDS?

A

Intrusion Detection System

Software that scans the computer as it runs, alerting of any signs of break in or suspicious activity