INMT441 FINAL EXAM 1 STUDY GUIDE

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Confidentiality (CIA Triad)

Only authorized users have access

Control = Encryption (Ex: Encrypting files in transfer)

2
New cards

Integrity (CIA Triad)

Data is correct and unaltered

Control = Hashing/Digital Signature (Ex: File hash verification)

3
New cards

Availability (CIA Triad)

Data is accessible to authorized users

Control = Backups, redundancy (Ex: Disaster recovery servers)

4
New cards

Script Kiddies (Threat Actor)

Amateur attackers using prebuilt tools, low skill.

5
New cards

Insiders (Threat Actor)

Employees/contractors (can be malicious or accidental)

6
New cards

State Actors (Threat Actor)

Well-funded attackers with geopolitical goals (ex: Solarwinds supply chain attack)

7
New cards

Advanced Persistent Threats (APT) (Threat Actor)

Skilled, well-funded, long-term stealthy attacks targeting high-value assets.

8
New cards

Hacktivists (Threat Actor)

Ideology-driven attackers

(Ex: defacing company website for activism)

9
New cards

Competitors (Threat Actor)

Steal things like trade secrets or customer lists for business advantage

10
New cards

Brokers (Threat Actor)

Discover vulnerabilities and sell them on the black market.

11
New cards

Shadow IT (Threat Actors)

Employees using unauthorized apps/devices, creating weak points.

12
New cards

Platform Vulnerabilities

OS flaws, legacy systems, hardware weaknesses

13
New cards

Configuration Vulnerabilities

Weak passwords, open ports, insecure protocols.

14
New cards

Third-Party Vulnerabilities

Risks from contractors, vendors, supply chain access.

15
New cards

Patch Vulnerabilities

Delays or improper implementation of security updates.

16
New cards

Zero-Day Vulnerabilities

Vulnerabilities that are unknown until already exploited by hacker

17
New cards

Email Attack Vector

Phishing, malware attachments

18
New cards

Wireless Attack Vector

Packet sniffing, file interception

19
New cards

Removable Media Attack Vector

USB drops with malware

20
New cards

Direct Access Attack Vector

Tailgating, physical tampering

21
New cards

Social Media Attack Vector

Impersonation, intel gathering

22
New cards

Supply Chain Attack Vectors

Pre-infected hardware, compromised vendors

23
New cards

Cloud Attack Vectors

Misconfigured storage, exposed sensitive files

24
New cards

Main Psychological Principles behind Social Engineering

(An Inside Cook Scams Us Fast w/ Tricks)

Authority, Intimidation, Consensus, Scarcity, Urgency, Familiarity, Trust.

25
New cards

Phishing (Social Engineering)

Mass scam emails

26
New cards

Spear Phishing (Social Engineering)

Targeted phishing at specific individuals

27
New cards

Whaling (Social Engineering)

Phishing aimed at executives

28
New cards

Vishing (Social Engineering)

Fraud phone calls

29
New cards

Smishing (Social Engineering)

Fraud text messages

30
New cards

Business Email Compromise (BEC) (Social Engineering)

Fake invoices/Payment scams

31
New cards

Physical methods of Social Engineering

Dumpster diving, Tailgating, USB drops, Shoulder surfing

32
New cards

Advanced Social Engineering Methods

AI-enabled deepfakes, fake voices

33
New cards

Typo-Squatting (Social Engineering)

Lookalike domain names (victoriassecret.com instead of the real website victoriasecret.com)

34
New cards

Pharming (Social Engineering)

Redirecting victims to spoofed website

  • Malware-based (host file changes)

  • DNS-based (server table modified)

35
New cards

Watering Hole Attack (Social Engineering)

Infecting a website commonly visited by a target group

36
New cards

Masking (Data Protection Control)

Hiding sensitive data elements (ex: SSN → ***1234).

37
New cards

Tokenization (Data Protection Control)

Replacing sensitive data with meaningless tokens (credit cards, SSNs).

38
New cards

Encryption (Data Protection Control)

Mathematical scrambling using keys.

39
New cards

Minimization (Data Protection Control)

Collecting only necessary data.

40
New cards

Segmentation (Data Protection Control)

Splits a database into smaller parts to limit access and contain breaches

41
New cards

Virus (Malware)

Needs user action to spread.

42
New cards

Worm (Malware)

Self-spreads via networks.

43
New cards

Polymorphic Virus (Malware)

Mutates to evade detection.

44
New cards

Trojan (Malware)

Malicious software disguised as legitimate software.

45
New cards

RAT (Remote Access Trojan) (Malware)

Trojan with remote control capability.

46
New cards

Ransomware (Malware)

Encrypts files, demands payment for decryption (ex: WannaCry).

47
New cards

Logic Bomb (Malware)

Malicious code triggered by time/event.

48
New cards

Rootkit (Malware)

Hides in the OS to avoid detection and give attackers privileged control.

49
New cards

Spyware (Malware)

Collects info; keyloggers record keystrokes.

50
New cards

Backdoor (Malware)

Hidden entry that attackers can abuse to bypass security (Can be easily abused)

51
New cards

Buffer Overflow (Software & Application Attacks)

Overwrites memory, causing crash/exploit.

52
New cards

Integer Overflow (Software & Application Attacks)

Exploits arithmetic limits.

53
New cards

Improper Input/Exception Handling (Software & Application Attacks)

Reveals system errors or info.

54
New cards

SQL Injection (Software & Application Attacks)

Malicious queries steal/modify database data.

55
New cards

XXS (Cross-Site Scripting) (Software & Application Attacks)

Injects malicious scripts.

56
New cards

Types of XSS (Software & Application Attacks)

  • Stored (in database, permanent)

  • Reflected (URL-based, temporary)

  • DOM-based (client-side script manipulation)

57
New cards

XSS impacts (Software & Application Attacks)

Cookie theft, session hijack, malware injection.

58
New cards

CSRF (Cross-Site Request Forgery) (Software & Application Attacks)

Tricking user into executing attacker’s action.

59
New cards

SSRF (Server-Side Request Forgery) (Software & Application Attacks)

Attacker makes a web app request internal resources.

60
New cards

Replay Attack (Software & Application Attacks)

Captured login/authentication packets re-sent.

61
New cards

Signature-based Antivirus (Endpoint Security)

Detects known threats

62
New cards

Anomaly-based Antivirus (Endpoint Security)

Detects unusual behavior

63
New cards

Browser Protections (Endpoint Security)

HttpsOnly (cookies inaccessible to JS),

SameSite (restricts cross-site sharing)

64
New cards

EDR (Endpoint Detection & Response) (Endpoint Security)

Logs, anomaly detection

65
New cards

Hardening Techniques (Endpoint Security)

  1. Patch management

  2. Sandbox (isolated environment)

  3. Allow/Deny lists (app restrictions)

  4. Close unused ports

66
New cards

Preventative Controls (Risk Controls)

67
New cards

Detective Controls (Risk Controls)

68
New cards

Corrective Controls (Risk Controls)

69
New cards

Compensating Controls (Risk Controls)

70
New cards

Deterrent Controls (Risk Controls)

71
New cards

CCTV = (Risk Controls)

Deterrent + Detective

72
New cards

IPS/IDS = (Risk Controls)

Detective + Preventative