• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/101

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

101 Cards in this Set

  • Front
  • Back

Cybersecurity

The assessments of threats and the mitigation of risks

Threat Assessment

A structured process of identifying the risks posed to a group or system

Risk mitigation

The systematic process of reducing the impact of a negative event, and/or the likelihood that it will occur/reoccur.

Social engineering

The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by gaining confidence and trust



Examples: phishing, pretexting, baiting, quid pro quo, tailgating, shoulder surfing

Social Engineering Principles

Authority


Intimidation


Consensus/Social Proof


Scarcity


Urgency


Familiarity


Trust

Social Engineering - Authority

Using authority is most effective with impersonation, whaling, and vishing attacks.

Social Engineering - Intimidation

Intimidation might be through bullying tactics and is often combined with impersonation and/or vishing attacks

Social Engineering - Consensus/Social Proof

This attack uses the principle that people are often more willing to like something that other people like. This can be accomplished via fake testimonials such as on imposter websites or rogueware websites. This is most effective with Trojans and hoaxes.

Social Engineering - Scarcity

This attack operates on the principle that people are often encouraged to take action when they think there is a limited quantity of something.



Scarcity is a psychology-based technique that is used to overcome users' objections and encourage immediate action.



Scarcity is often most effective with phishing and Trojan attacks. People often make quick decisions without really thinking them through.

Social Engineering - Urgency

Urgency is a psychology-based technique that is used to overcome users' objections and encourage immediate action. This principle is used by attackers to force their victims to make hasty decisions that later prove to be detrimental.



ie. When an attacker puts a clock on a decision, such as having a counter counting down after a warning that in 72 hours they will lose all their data if they don't do a particular action.



Urgency is most effective with ransomware, phishing, vishing, whaling, and hoaxes.

Social Engineering - Familiarity/Liking

This operates on the principle that if you like someone, you are more likely to do what the person asks. An example is celebrity endorsements. Using this principle, social engineers attempt to build a rapport with the victim, building a relationship before launching the attack.



This is most effective with shoulder surfing and tailgating attacks.

Social Engineering - Trust

Building on the principle of familiarity/liking, some social engineers attempt to build a trusting relationship between themselves and the victim. This can take some time but can have tremendous payoffs.



This principle is most often used with vishing

Phishing

The most common type of social engineering attacks that occurs today.



Phishing is a technique for attempting to acquire sensitive data, such as credit card numbers, usernames, or passwords, through fraudulent solicitation e.g. email where the perpetrator pretends to be from a reputable business or person.



There are 6 most common forms of phishing attacks:



Deceptive phishing - emails that appear to be from a legitimate company or person in an attempt to steal people's personal data or login credentials, often using threats or urgency to scare users into doing what the threat actors want them to do.



Spear phishing- personalized phishing attacks. Customized attack emails with the target's legitimate details embedded into the email text.



Whaling - when spear phishers target executives in an attempt to steal their login credentials. If successful, they can use the credentials to infiltrate the network in order to use malware or rootkits or they can then perpetrate CEO fraud, where they can use the compromised email account of the CEO or other executive by authorizing fraudulent wire transfers or leveraging the account to conduct W-2 phishing, where they request W-2 information for all employees so they can file fake tax returns on their behalf or post their information on the dark web.



Vishing - phishing via telephone.



Smishing - phishing via text messaging



Pharming - this method of phishing leverages cache poisoning against the DNS by converting website names to the IP address of the malicious website.

Pretexting

Where an attacker uses a good pretext, or fabricated scenario, that they use to attempt to steal their victim's personal information. Example - when a scammer says they need certain bits of information to verify the victim's identity. Pretexting relies on building a false sense of trust with the victims such as saying they are from the HR or finance departments.

Baiting

Baiting is similar to phishing except it uses the promise of a reward such as a movie, software or music download, to trick users into providing their login credentials. This type of attack is not restricted to online media. An example is an attacker sending out corrupted CDs or DVDs loaded with malware that appear to be something desirable.

Quid pro quo

Similar to baiting but instead of promising goods, the promised benefit is in the form of a service. ie. fraudsters impersonating the SSA to obtain victims' personal information for the purposes of committing identity theft.

Tailgating

Aka piggybacking, in these types of attacks the threat actor attempts to infiltrate restricted areas by impersonating a delivery person or fellow employee and asking someone with actual credentials to hold the door for them so they can access the building.

Malware

Hardware, software, or firmware meant to perform an unauthorized process that will compromise the confidentiality, integrity, or availability of a system e.g. a virus, worm, Trojan, adware, ransomware, or other code-based entity that infects the host .

Packet sniffer

Software that monitors network traffic on wired and wireless networks and captures packets. Packet sniffers are used by network managers to monitor and analyze traffic, but hackers also use them

Man-in-the-middle (MITM) attack

An attack where the adversary positions themselves between the user and the system so that they can intercept and alter data traveling between them. e.g. a remote hacker can update information or manipulate software being downloaded to gain access or information from the target.

Brute force attack

An attack that involves trying all possible authentication combinations to find a match. These attacks are often used for attacking authentication and discovering hidden content and pages within a web application.

Code injection

This type of attack injects code into the target application to then be interpreted and executed e.g. HTML injections are used to change a website or to steal personal information (PII). HTML injections can occur via website link, data, or input fields on web forms.

Key logger

A program designed to record which keys are pressed on your keyboard. It can obtain usernames, passwords, or encryption keys and use them to bypass security measures.

CIA triad

Confidentiality


Integrity


Availability

User Attacks

Social Engineering


Phishing Attacks


Credential Reuse


Malwate Attacks


Man in the Middle


Packet Sniffing


Computer Theft

Web Attacks

Brute-force Attacks


Code Injection


Faulty Sessions

Server Attacks

OS Exploit


Malicious Software

Database Attacks

Default Credentials


Unpatched Database


Lack of Segregation

CIA Triad - Confidentiality

The state of keeping or being kept secret or private.



Ensuring sensitive information does not reach unauthorized people.



Enforced via encryption and authentication.

CIA Triad - Integrity

The quality of being honest, whole, or undivided.



This refers to protecting information from being modified by unauthorized parties.



Mitigation - use a secure hashing algorithm and process when transferring sensitive data to make sure it cannot be intercepted or altered in transit.

CIA Triad - Availability

The quality of being able to be used or obtained.



Examples: DoS attacks to make it impossible for legitimate clients to use a service or make transactions, taking down a web-connected generator to disable a critical power supply.



Mitigation - creating regular backups and load-balancing server load.

Governance

The framework for managing performance and risk, oversight of compliance and control responsibilities, and defining the cyber mission by mapping the structure, authority, and processes to create an effective program.

Risk Assessment

Analyzes what can go wrong, how likely it is to happen, what the potential consequences are, and how tolerable the identified risk is.

Proper steps for implementation of a new security policy

1 - obtain support and commitment from management


2 - analyze risks to security


3 - implement appropriate controls


4 - review, test, and update procedures.

Proper steps for creating/ implementing an incident response process for a company

1 - preparation


2 - identification/ detection


3 - analysis


4 - containment


5 - eradication


6 - recovery

Proper steps for performing a BIA (Business Impact Analysis) for a set of critical servers as part of a risk management push

1 - identify threats


2 - remediate risks


3 - assign risk to each function or asset


4 - identify critical functions or processes


5 - identify assets and resources

Application Attacks

DDoS


XSS


DNS poisoning


SQL injection

Wireless Attacks

Bluejacking


Bluesnarfing


Evil twin


Rogue AP

Cryptographic Attacks

Birthday attack


Rainbow tables


Dictionary attack


Brute force



Birthday Attack - an attack on a hashing system that attempts to send two different messages with the same hashing function, causing a collision. A collision happens when two files have the same hash, which destroys their integrity.



Rainbow Tables -Rainbow tables use precomputed hashes in an attempt to recover the prehashed password.



Dictionary Attack: The attacker tries a list of known or commonly used passwords.



Brute Force Attack: Does not use a list of passwords; instead, it aims at trying all possible combinations in the password space.

Cyber Kill Chain

Reconnaissance


Weaponization


Delivery


Exploitation


Installation


Command and Control


Actions on Objectives

Viruses

A virus attaches itself to a host and requires activation in order to operate.



Boot sector virus - attacks the operating system, specifically the disk boot sector information, the partition table, and sometimes the file system



Program virus - code that inserts itself into executable programs. This virus becomes active once the infected program runs. Can be embedded or attached to web pages or PDF files, which make them difficult to detect



Script virus - written in a scripting language such as JavaScript or Python or PostScript.



Macro virus - written in the same macro language used for software programs, such as Word or Excel. Since they are focused on an application and not an OS, they can infect any computer running any OS. When executed, they can infect every other document on the user's computer.



Multipartite virus - uses both boot sector and executable file infection methods to spread themselves.

Worms

Worms do not need human interaction to activate


activate



Self-replicating programs, considered a memory-resident virus.



A worm does not need to attach itself to an executable file and instead can replicate over network resources



Quickly consume network bandwidth as they replicate



Can crash an OS or server application via a DoS attack



Can have a payload that performs further malicious actions

Trojans

A program that hides within something else. Can be embedded within a downloadable object, e.g. a Screensaver, software, or game

Remote Access Trojans (RATs)

RATs function as backdoor applications. Once the RAT is installed, the attacker can access the victim's computer and install files and software onto it.



Can be used as a botnet to launch a DDoS attack or send mass email spam.


Botnets are 2 or more zombie computers being remotely controlled by an attacker.

Spyware

A program that gains a hold on the victim's system and can be installed with or without the user's knowledge. Monitors user activity and sends the information to an external target.



Packet sniffers can be used as spyware



If the application is installed without the user's consent and/or cannot be easily removed, it is spyware.

Keyloggers

Captures the keystrokes of the intended victim. Can be software or hardware.

Adware

Any type of software or browser plug-in that displays or downloads advertisements via pop-ups.



If the user gives consent, whethwr intentionally or not, it is adware

Backdoor

Remote access methods that are installed without the user's knowledge. Can be installed via malware, such as a Trojan, or by a malicious insider.



Can also be created by a software developer for testing and development of the software.



An example is a router configured with the default username and password.

Rootkits

Rootkits are a type of backdoor that is more difficult to detect and remove. Can change core system files and programming interfaces so that local shell processes can't show their presence if run from an infected machine.



Often installed in the kernel of the OS

Vulnerability

Weaknesses that can be exploited by an attacker

Governance

Provides management frameworks for implementing security practices in an organization. It helps a business decide how to enforce its security practices by developing policies, standards, processes, and procedures

Risk Management

Helps an organization identify which assets are most important and determine how they are most likely to be compromised. The business then uses this information to decide how to best protect its most important and at-risk assets. This decision then helps inform the business's security practices.

Compliance

Compliance focuses on ensuring internal security policies are being followed, and verifying that the business is following relevant security laws currently in effect.

Policies

Policies are

Standards

Standards are

Processes

Processes are

Procedures

Procedures are

Proper steps for developing a security culture framework

1 - measure and set goals


Identify the particular security concerns


Define what people should do


Define a goal for how well you want the.


organization to perform.


Measure how often employees currently


perform the behavior properly to create


a baseline in order to measure progress


2 - involve the right people


After defining the goals, inform the


revelant employees of the new target


Includes security personnel and training


officers


3 - create an action plan


A plan typically involves developing a


training exercise that addresses the


security issue at hand.


4 - execute the plan


After the plan has been formulated, run


the training


5 - measure changes


Collect data on how well people are


adhering to the guidelines taught in


training and compare to the baseline to


determine if the exercise is effective


C-Suite Officers

CEO - Chief executive officer


CIO - Chief information officer


CISO - Chief information security officer


COO - Chief operating officer


CFO - Chief financial officer


CTO - Chief technology officer


CPO - Chief product officer

Security controls

Administrative


Technical


Physical






Security controls - Administrative

e.g. Requiring employees to adhere to training guidelines

Security controls - Technical

e.g. Forcing developers to authenticate using SSH keys rather than passwords

Security controls - Physical

e.g. Protecting a building by requiring keycard access

Security goals

Preventative DeterrentDetectiveCorrective Compensating

Security goals - Preventative

Prevents access with physical or logical/technical barriers. e.g. keycard access

Security goals - Deterrent

Discourages attackers from attempting to access a resource

Security goals - Detective

Detective controls do not protect access to a confidential resource, rather it identifies and records attempted access

Security goals - Corrective

Attempts to fix an incident and possibly prevent reoccurence.

Security goals - Compensating

Does not prevent attacks but restores the function of compromised systems

Vulnerability

The aspect of a business that can be exploited to compromise a system's CIA

Threat

An actor that might exploit a vulnerability. Threats can be intentional, unintentional, or due to natural disaster

Risk

The possibility of losing something valuable. A risk will cost money if it occurs.

OWASP

Open


Web


Application


Security


Project

OWASP Top 10

1. Determine assessment scope


Listing the assets under consideration,


determining their value, and defining


objectives for your threat modeling


assessment. Often considered one at a


time and begins with asset inventory.


2. Identify threat agents


A threat agent is person or group that


can actualize a threat, whether or not


they are malicious


3. Identify potential attacks


Identify which attacks each threat


agent is likely to perform, based on how


much skill or funding they have


4. Identify exploitable vulnerabilities and


points of failure


Identify ways for the data to enter or


exit the system and which systems are


likely to suffer security failures.


5. Rank/Prioritize Risks


Rank which potential attacks are most.


severe and most likely to occur


6. Mitigate risks


Determine ways to mitigate the most


serious risks you identified

Qualitative Risk Analysis

The process of prioritizing risk based on intangible factors. Intuitive analysis. Faster than quantitative analysis and for high-level problems, can be just as effective.

Quantitative Risk Analysis

Calculated risk analysis that considers asset value and exposure factor, or how much of an asset will be affected in the event of a breach.

Loss Expectancies

A measure of how much money an organization will lose in the event of a given breach. There are 2 common methods of measuring loss expectancy, single loss expectancy (SLE) and annual loss expectancy (ALE).

SLE - Single Loss Expectancy

Calculated as SLE = AV (Asset Value) × EF (Exposure Factor)

ALE - Annual Loss Expectancy

Calculated as ALE = ARO (Annual Rate of Occurance) × SLE

Annual Rate of Occurance

An estimate of how many a risk is likely to occur in a given year.

Signature-based IDS

Compares patterns of traffic to predefined signatures



Requires regular updates as new attack signatures are released



Vulnerable to attacks through packet manipulation that tricks the IDS into believing malicious traffic is good



Unable to detect zero-day attacks

Anomaly-based IDS

Compares patterns of traffic against a well-known baseline



Prone to issuing false alerts



Assumes normal network behavior never deviates from the well-known baseline



Excellent at detecting when an attacker probes or sweeps a network

Network IDS (NIDS)

Filters an entire subnet on a network


Matches all traffic to a known library of attack signatures


Passively examines network traffic at the points where it is deployed


Relatively easy to deploy and difficult to detect by attackers



Requires an administrator to react to an alert by examining what has been flagged

Host-based IDS (HIDS)

Runs locally on a host-based system or user's workstation or server



Acts as a second line of defense against malicious traffic that successfully bypasses a NIDS



Examines entire file systems on a host, compares them to previous snapshots or baselines, and generates an alert if there are significant differences between the two



Requires an administrator to react to an alert by examining what has been flagged

IDS and IPS differences

IDS physically connects via a network TAP (Test Access Port), or mirrored port, or SPAN (Switched Port Analyzer)


IDS requires an administrator to react to an alert by examining what has been flagged



IPS physically connects inline with the flow of data and is usually placed between a firewall and network switch



IPS requires more robust hardware due to the amount of traffic flowing through it


IPS automatically takes action by blocking and logging a threat, thus not requiring administrative intervention

IOA - Indicator of Attack

IOAs indicate attacks happening in real time



Proactive approach to intrusion attempts



Indicates that an attack is currently in progress but a full breach has not been determined or has not yet occurred



Focuses on revealing the intent and end goal of the attacker regardless of the exploit or malware used in the attack

IOCs - Indicators of Compromise

Indicates previous malicious activity



Reactive approach to successful intrusions



Indicate that an attack occurred, resulting in a breach



Used to establish an adversary's TTPs (tactics, techniques, and procedures)



Exposes all of the vulnerabilities used in an attack, giving network defenders the opportunity to revamp their defenses as part of their mitigation strategy, and learn from an attack so it won't happen again

NSM (Network Security Monitoring)

NSM is threat-centric, primarily focusing on the adversary and not the vulnerabilities



Focuses on the visibility of an attack, not the response to the attack



Reveals statistical data related to specific IOAs and IOCs from attacks

NSM stages

Detection


Collection


Analysis


Response


Escalation


Resolution

What is Wireshark?

Wireshark is a protocol analyzer

Due process

Protecting and respecting the rights of the employees.

Due care

Due care is the mitigation action an organization takes to defend against the risks that have been discovered during due diligence.



Due care is a way to implement something right away in order to perform mitigation procedures.



In order to perform due care, the organization must first perform due diligence

Due diligence

Due diligence is making sure the right thing was done correctly, and if it is necessary to do it again or if further research is required.

Playbook

A Cybersecurity Playbook is a step-by-step document that an organization uses to outline the procedures on how to respond to specific incidents.



Playbooks allow for the IRT (Incident Response Team) to pick up the playbooks in the event of an incident and use them as a guide to begin responding right away.

Pharming

Pharming is a type of DNS poisoning where a HOSTS file is changed to point a friendly URL to to a malicious website. The user is tricked into accessing the malicious website and entering sensitive information such as a username and password.

Ping of Death Attack

A ping of death sends a packet over 65,535 which overflows the target system's memory buffers. The flooded memory resources causes the target system to crash. It is an older attack that is usually stopped by routers or the operating system.

CSF (Cybersecurity Framework) 5 core functions

1. Identify


2. Protect


3. Detect


4. Respond


5. Recover

Multi-partite virus

Multi-partite viruses first attack the boot sector. With the boot sector infected, the virus can then ensure that it's loaded each time the system boots. With the virus in memory, it can then attack personal files and system files to deliver its payload.

OCSP

Online


Certificate


Status


Protocol

SAN (network)

Storage


Area


Network

SAN (certificates)

Subject


Alternative


Name




An SAN is an extension field on a web server certificate using multiple subdomain labels to support the identification of the server