Comprehensive Cyber Security Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/247

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

248 Terms

1
New cards

Confidentiality

Data Confidentiality: Ensuring that confidential information is not disclosed to unauthorized individuals. Privacy: Allowing users to control their personal data.

2
New cards

Integrity

Protecting information from improper modification or unauthorized manipulation.

3
New cards

Availability

Ensure authorized users have access to information and resources when needed.

4
New cards

Low Impact

Limited adverse effect on organizational operations.

5
New cards

Moderate Impact

Serious adverse effect on organizational operations.

6
New cards

High Impact

Severe or catastrophic adverse effect on organizational operations.

7
New cards

Adversary (Threat Agent)

Entity that performs detrimental activities.

8
New cards

Passive Attacks

Eavesdropping on communications.

9
New cards

Active Attacks

Modifying system resources or operations.

10
New cards

Insider Attacks

Attacks from within the security perimeter.

11
New cards

Outsider Attacks

Attacks from outside the security perimeter.

12
New cards

Countermeasures

Prevent, detect, and recover from attacks.

13
New cards

Risk

Measure the extent of potential threats.

14
New cards

Security Policy

Set of criteria for security services.

15
New cards

System Resources (Assets)

Hardware, software, data, communication facilities, and networks.

16
New cards

Threats

Circumstances or events that can cause harm.

17
New cards

Vulnerabilities

Weaknesses in an information system.

18
New cards

Awareness

Informing employees about security issues.

19
New cards

Training

Teaching skills to perform IT tasks securely.

20
New cards

Education

Targeted at security professionals.

21
New cards

Symmetric Encryption

Uses a single key for both encryption and decryption.

22
New cards

Public-Key Encryption

Encryption: private key, Decryption: public key.

23
New cards

RSA

Encrypt: C=M^e mod n, Decrypt: M=C^d mode n = (M^e)^d mod n = M.

24
New cards

Hash Functions

Example: SHA-3.

25
New cards

Multi-factor authentication

Basic Requirements: Multi-factor authentication.

26
New cards

Password-Based Authentication

Vulnerabilities: Offline dictionary attacks, specific account attacks, popular password attacks, password guessing, workstation hijacking.

27
New cards

Biometric Authentication

Types: Fingerprints, facial recognition, iris scans, voice patterns.

28
New cards

Discretionary Access Control (DAC)

Based on the identity of the requestor and access rules.

29
New cards

Mandatory Access Control (MAC)

Based on comparing security labels with security clearances.

30
New cards

Role-Based Access Control (RBAC)

Based on roles assigned to users.

31
New cards

Attribute-Based Access Control (ABAC)

Based on attributes of the user, resource, and environment.

32
New cards

Subjects

A capable of accessing objects - 1. owner 2. Group 3. World rwx/rwx/rwx.

33
New cards

Objects

A resource.

34
New cards

Access right

Way to access.

35
New cards

Inodes (index nodes)

Control structures containing key information for managing files.

36
New cards

Permissions

Read, write, execute permissions for owner, group, and others.

37
New cards

Special Permissions

Set user ID, set group ID, sticky bit.

38
New cards

Secure Sockets Layer (SSL)

Protocols for secure communication over a computer network.

39
New cards

Transport Layer Security (TLS)

Protocols for secure communication over a computer network.

40
New cards

MIME

Multipurpose Internet Mail Extensions for email.

41
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions for encrypted and signed email.

42
New cards

SQL Injection

Techniques: Premature termination of a text string and appending a new command.

43
New cards

Countermeasures for SQL Injection

Defensive coding, detection, run-time prevention.

44
New cards

Database Access Control

Principles: Allowing users to access only portions of the database they are authorized to use.

45
New cards

Encryption

Key management, making it difficult to perform record searching.

46
New cards

Viruses

Infection vectors, phases (dormant, triggering, propagation, execution).

47
New cards

Worms

Self-propagating programs exploiting software vulnerabilities.

48
New cards

Trojan Horses

Malicious programs disguised as legitimate software.

49
New cards

Advanced Persistent Threats (APTs)

Characteristics: Advanced techniques, persistent efforts, targeted attacks.

50
New cards

Flooding Attacks

Overloading network capacity.

51
New cards

Distributed Denial of Service (DDoS)

Using multiple systems to generate attacks.

52
New cards

Reflection Attacks

Using third-party servers to amplify the attack.

53
New cards

DNS Amplification Attacks

Exploiting DNS servers to flood the target with traffic.

54
New cards

Firewalls

First line of defense that acts as a gateway, protecting the network perimeter.

55
New cards

Anomaly Detection

Detects deviations from normal behavior based on a baseline (e.g., unusual web activity).

56
New cards

Signature Detection

Compares observed activities against known malicious patterns (e.g., virus definitions).

57
New cards

Intrusion Prevention System (IPS)

Actively monitors and prevents attacks in real-time.

58
New cards

State-Sponsored Actors

Advanced Persistent Threat (APT) groups with resources and funding, targeting specific entities.

59
New cards

Script-Kiddies

Unskilled attackers using pre-made scripts.

60
New cards

Black Hats

Operate without authority (malicious hackers).

61
New cards

White Hats

Ethical hackers with permission.

62
New cards

Gray Hats

Hackers operating in a gray area, sometimes without full authorization (e.g., bug hunters).

63
New cards

Initial Access

Gaining unauthorized entry.

64
New cards

Privilege Escalation

Gaining higher access levels within the system.

65
New cards

Maintaining Access

Creating a backdoor to allow future re-entry.

66
New cards

False Positives/Negatives

The need to confirm if an alarm is legitimate (true positive) or not (false positive).

67
New cards

Playbooks

Predefined responses to various detected threats.

68
New cards

Application-Level Gateway

Filters traffic at the application layer.

69
New cards

Circuit-Level Gateway

Operates at the session layer, verifying the legitimacy of a connection (like showing your passport at a border).

70
New cards

VPN (Virtual Private Network)

Provides encrypted connections between two points (like buying a proxy to create a secure tunnel between your device and a server).

71
New cards

Snort Inline

An open-source IDS/IPS system often used in honeypot setups to monitor and detect threats in real-time.

72
New cards

Cybercriminals

Aim for financial gain through identity theft, data ransoming, or corporate espionage.

73
New cards

Activists (Hacktivists)

Attack for social or political reasons, often via website defacement or DoS attacks.

74
New cards

State-Sponsored

Government-backed intruders conducting espionage or sabotage (e.g., Advanced Persistent Threats, APTs).

75
New cards

Other Hackers

Motivated by technical challenge or recognition.

76
New cards

Intrusion Detection System (IDS)

Detect unauthorized access or abnormal activities on a system or network.

77
New cards

Host-based (HIDS)

Monitors a single host for suspicious activity (e.g., system calls, log files).

78
New cards

Network-based (NIDS)

Monitors network traffic to detect suspicious behavior.

79
New cards

Distributed or Hybrid IDS

Combines both host and network data for centralized analysis.

80
New cards

Packet Filtering Firewall

Examines packets based on IP address, port number, and protocol.

81
New cards

Stateful Inspection Firewall

Tracks the state of active connections and allows traffic based on established connections.

82
New cards

Application-Level Gateway (Proxy Firewall)

Intermediary for application-level traffic; can monitor and filter content.

83
New cards

Firewall Design Goals

All traffic must pass through the firewall. Only authorized traffic is allowed. The firewall itself must be secure and immune to penetration.

84
New cards

Firewall Policies

Defines which types of traffic are allowed or denied. Can filter based on IP addresses, protocols, applications, or user identity.

85
New cards

Limitations of Firewalls

Cannot protect against internal threats or attacks that bypass the firewall. May be vulnerable to misconfigurations or specific application vulnerabilities.

86
New cards

Intrusion Prevention System (IPS)

An extension of IDS that can block detected threats in real time.

87
New cards

Buffer Overflow

Occurs when a program writes more data to a fixed-length buffer than it can hold, overwriting adjacent memory, leading to data corruption, unexpected control flow changes, and execution of attacker-supplied code.

88
New cards

Morris Internet Worm

Exploited a buffer overflow in the 'fingerd' service in 1988.

89
New cards

Stack-based overflow techniques

Detailed in Aleph One's article 'Smashing the Stack for Fun and Profit' during 1995-1996.

90
New cards

Code Red, Slammer, and Sasser

Worms that exploited buffer overflows in Microsoft products from 2001 to 2004.

91
New cards

Buffer Overflow

Occurs when data exceeds a buffer's storage limits, affecting the stack, heap, or global data regions.

92
New cards

Stack Overflow

Overwrites critical control data such as return addresses in a function's stack frame, allowing attackers to redirect execution.

93
New cards

Heap Overflow

Targets dynamically allocated memory (heap), potentially modifying function pointers or management structures.

94
New cards

Global Data Overflow

Affects global buffers, potentially modifying function pointers or management structures.

95
New cards

Unsafe programming practices

Using functions like gets(), strcpy(), and similar routines without bounds checking in languages like C.

96
New cards

Shellcode

Attacker-supplied machine code that typically launches a command shell or performs another malicious action.

97
New cards

Metasploit Project

Tools and frameworks that automate parts of the exploit development process.

98
New cards

Language Safety

Using memory-safe languages to prevent overflows by enforcing strict type and boundary checks at compile time.

99
New cards

Safe Coding Techniques

Code audits and rewriting insecure routines to mitigate risks.

100
New cards

Stack Canaries

Compiler extensions that inject a random value before return addresses, aborting the program if altered.