IB CS P3 Vocab

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/96

flashcard set

Earn XP

Description and Tags

Vocabulary for IB Computer Science Paper 3 M26 & N26

Last updated 1:50 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

97 Terms

1
New cards

What is PTES/PenTES?

Penetration Testing Execution Standard

2
New cards

What is PenTES for?

A framework for conducting penetration testing; a structured approach to testing and reporting results

3
New cards

How many phases in PenTES?

7 phases

4
New cards

Phase 1 is…?

Pre-engagement interactions

5
New cards

What happens in phase 1?

Preperation, getting document approvals, putting together needed tools

6
New cards

Why is phase 1 important?

Needed so that testing aligns with security needs and operational requirements of system

7
New cards

Aspects of Phase 1

1.1 Goal setting and identifying targets

1.2 Defining scope and rules of engagement

1.3 Testing approaches

8
New cards

1.1 Goal setting and identifying targets

Objectives established after finding key concerns; specific targets and high risk areas identified

9
New cards

1.1 Examples of key concerns

Patient data integrity

Uninterrupted service delivery

Compliance with health sector regulations

10
New cards

1.1 Examples of high risk areas

Patient record databases

IoT enabled medical devices

11
New cards

1.2 Defining scope and rules of engagement

Confirms which parts of the system are being tested to avoid disruption; rules of engagement agreed upon by team and client to understand methods and extent of PenTES

12
New cards

1.3 Testing approaches

Black box testing

White box testing

Grey box testing

13
New cards

Black box testing

Attack simulated from perspective of an uninformed external hacker, looks at surface level issues

14
New cards

White box testing

Analysis with full in-depth information of client’s system, requires access to network diagrams, system configurations, and known issues

15
New cards

Grey box testing

Mixture of black and white testing, uses partial knowledge of systems. Simulates inside threat or external attack with partial insider info

16
New cards

Phase 2 is…?

Intelligence gathering

17
New cards

What happens in phase 2?

Team collects data from outside sources like social media or official records to be then analysed. Categorised as OSINT.

18
New cards

What is OSINT?

Open-Source Intelligence (Phase 2)

19
New cards

Aspects of Phase 2

2.1 OSINT Techniques

2.2 Other Techniques

20
New cards

2.1 OSINT Techniques

Utilisation of tools and sources like search engines, social media, forums, internet-facing resources

21
New cards

2.1 Examples of info gathered with OSINT Techniques

Employee details - Found through employee social media, specifically IT/Admin staff

Technology usage - Insight into client software and hardware, through forums

Security policies - Looks at publicly available security policy amd procedures

22
New cards

2.2 Other Techniques

Targeted information

Network Scanning + Mapping

Social Engineering reconnaissance

23
New cards

2.2 Targeted Information

Uses advanced search techniques (search engine dorking) to find exposed sensitive files or login portals

24
New cards

Search engine dorking

Technique using complex search queries to find information not easily accessible with normal searches

25
New cards

2.2 Network Scanning + Mapping

Using advanced network mapping to learn network topologies (servers, firewalls, other devices). IP addresses of all devices on network catalogued to understand scope of network.

26
New cards

2.2 Examples of key network scanning and mapping activities

Port scanning - technique to identify open ports and services on target network device

OS detection - Remote scanning of target host that sends back details of the OS if there is a match

Network topology mapping - Graphing a network’s topology with all its nodes and links

27
New cards

2.2 Social engineering reconnaissance

Uses vishing (voice phishing) or pretexting (uses a false scenario/pretext to get sensitive info) to get information from employees

28
New cards

Phase 3 is…?

Threat modelling

29
New cards

What happens in phase 3?

Potential threats and/or vulnerabilities are identified, strategies to stop them are developed; a detailed threat analysis is conducted

30
New cards

Aspects of Phase 3

3.1 Identifying potential adversaries

3.2 Assessing hacker capabilities and intentions

3.3 Methods of exploitation

3.4 Valuable asset evaluation

3.5 Prioritization of security efforts

31
New cards

3.1 Identifying potential adversaries

Determines who might target the network; e.g. cybercriminals seeking patient data or insiders with network access

32
New cards

3.2 Assessing hacker capabilities and intentions

Analyse what potential hackers are capable of and how they might use accessed data.

33
New cards

3.3 Methods of exploitation

Document how hackers might exploit system weaknesses; e.g. malware deployment, social engineering attacks, network attacks

34
New cards

3.4 Valuable asset exploitation

Determine which assets are most critical and look at potential impact of compromise; e.g. EHRs

35
New cards

3.5 Prioritization of security efforts

Use prior analysis to guide the focus of PenTES; most valuable and vulnerable areas get the most attention.

36
New cards

Phase 4 is…?

Vulnerability analysis

37
New cards

What happens in phase 4?

Vulnerabilities that could be used by a hacker are identified and confirmed through manual and automated tools; guides next steps of PenTES

38
New cards

Aspects of Phase 4

4.1 Scanning

4.2 Manual examination

4.3 Assessment of weaknesses

4.4 Prioritisation

39
New cards

4.1 Scanning

Team uses automated tools to quickly find known vulnerabilities; e.g. unpatched software or insecure configurations

40
New cards

4.2 Manual examination

Combines automation with manual checks to detect subtler flaws and vulnerabilities that need expert analysis

41
New cards

4.3 Assessment of weaknesses

Evaluates vulnerabilities found to see potential impact of hacker exploitation

42
New cards

4.4 Prioritisation

Determines which flaws are most important based on factors like ease of exploitation and potential damages

43
New cards

Phase 5 is…?

Exploitation

44
New cards

What happens in phase 5?

Attempts are made to breach the system with vulnerabilities from phase 4.

45
New cards

Aspects of Phase 5

5.1 Targeted Breaching Attempts

5.2 Exploit development

5.3 Employing various techniques

5.4 Assessing impact

46
New cards

5.1 Targeted Breaching Attempts

Team uses specific techniques to exploit known vulnerabilitie, test defenses

47
New cards

5.2 Exploit development

Team crafts custom scripts/tools tailored to specific known vulnerabilities. Shellcode is executable code that does this allowing an attacker to gain elevated priveliges (local) or target a remote machine’s process on a shared network.

48
New cards

5.3 Employing various techniques

Team will use some or all of the listed techniques depending on known vulnerabilities; SQL injection, cross-site scripting (X-SS), buffer overflow attacks, password cracking tools.

49
New cards

5.4 Assessing the impact

Now, team tries to understand the potential damages or access that can be caused by successful exploitation

50
New cards

Phase 6 is…?

Post-exploitation

51
New cards

What happens in phase 6?

If access is gained from phase 5, the focus is now on keeping control of the system and getting data from it; let's team to comprehend full scope and scale of a breach

52
New cards

Aspects of Phase 6

6.1 Data Access and analysis

6.2 Privilege escalation

6.3 Establishing persistence

6.4 Operational impact assessment

6.5 System forensics and malware analysis

53
New cards

6.1 Data access and analysis

Investigated the types of sensitive data available after a breach; e.g. patient records, admin data, confidential information

54
New cards

6.2 Privilege escalation

Examines how escalating user privileges can increase access within the network

55
New cards

6.3 Establishing persistence

Evaluated ways a hacker could maintain access to the network long term; evaluates possible severity of breach

56
New cards

6.4 Operational impact assessment

Assess potential impact of breach on hospital services and patient safety

57
New cards

6.5 System forensics and malware analysis

Analyse any traces left by exploitation process by looking at system logs or looking at changes made to system configurations (system forensics): also through detecting malware implants

58
New cards

Phase 7 is…?

Reporting

59
New cards

What happens in phase 7?

Everything prior is documented and presented to the client in a report.

60
New cards

Aspects of Phase 7

7.1 Vulnerability and exploitation details

7.2 Actionable recommendations

7.3 Security posture assessment

61
New cards

7.1 Vulnerability and exploitation details

Part of the report that gives an overview of vulnerabilities found, methods used to exploit them, and possible impact

62
New cards

7.2 Actionable recommendations

Provides suggestions prioritised for mitigating security risks and strengthening network defenses

63
New cards

7.3 Security posture assessment

Holistic analysis of overall strengths and weaknesses, offering future focus and areas for improvement

64
New cards

Outcome of Phase 7

Allows team to develop response plan (includes incident detection, response strategies, recovery processes); guides clients efforts in improving cybersecurity and responses to hackers

65
New cards

Ethical considerations

When doing any PenTES, ethics are vital especially in healthcare. This includes:

  • proper authorisation

  • data confidentiality and integrity

  • non-disruption of services

  • reporting and responsiveness

66
New cards

Malware

Software designed to disrupt, damage, or provide unauthorised access to a system.

67
New cards

Uninterrupted service delivery

No downtime, no interruptions, minimal lag when accessing patient information

68
New cards

Hacker

Person who breaks into computer systems

69
New cards

Security posture assessment

(Outcome of Phase 2) In-depth analysis of a system’s internal and external defenses to evaluate overall effectiveness of security measures.

70
New cards

SQL Injection

A code injection technique used to attack data-driven applications; inputs targeted queries to manipulate and access data. Lack of input validation facilitates this. (Phase 5)

71
New cards

Cross-site scripting (X-SS)

Injecting malicious scripts in applications or websites trusted by a target user. May result in theft of information, malware delivery to patient devices, and session hijacking (taking over an active patient session on the site). (Phase 5)

72
New cards

Buffer overflow attacks

Exploitation of a coding error (buffer overflow), using malinformed inputs to overwrite memory of an application (Phase 5)

73
New cards

Password cracking tools

Tools/code that are used to guess or recover passwords (Phase 5). Examples:

  • Hashcat - most popular and advanced password recovery tool with large library of supported devices/software.

  • John The Ripper - free password cracking software that combines numerous crackers into one package.

74
New cards

Other sensitive information present in hospitals (Beyond EHRs)

  • Patient profiles —> can contain info connected to other agencies based on their conditions and personal life (i.e. social worker intervention) that can implicate other agencies in a data breach

75
New cards

Internet of Medical Things

Specific subset of IoT for healthcare. The network of devices with sensors, processing ability, software and technology that connect and exchange data between devices and the cloud, as well as between the devices themselves in a healthcare setting.

76
New cards

Protected Health Information (PHI)

The specific name for sensitive information in EHRs that HIPAA protects.

77
New cards

CVSS

Common Vulnerability Scoring System. Used to evaluate severity of a vulnerability.

78
New cards

BC&DR

Business Continuity and Disaster Recovery. Wider plans that a cybersecurity response plan falls into.

79
New cards

Health Insurance Portability and Accountability Act

HIPAA

80
New cards

Responsible Disclosure

The process of privately reporting a vulnerability to the vendor before making it public. The ethical hacking counterpart to finding bugs. This improves trust and safety between hackers and organisations.

81
New cards

Non-Disclosure Agreement (NDA)

A legal document that binds the testers to confidentiality - crucial for protecting Personal Health Information (PHI) and details of any vulnerabilities.

82
New cards

Burp Suite

Proprietary software for security assessment and PENTES of web applications. Has a database with known unsafe syntax/key word patterns in HTTP requests.

83
New cards

OWASP

Open Worldwide Application Security Project. Community that publishes open-source information on web application and IoT security.

84
New cards

OWASP ZAP

Zed Attack Proxy. Dynamic application security testing tool that allows the user to manipulate all the traffic that passes through it, including HTTPS encrypted traffic.

85
New cards

Nessus/OpenVAS

Industry standard vulnerability scanners

86
New cards

Port

An entry point that can be closed or opened by a website in a computer. Software at the level of the OS and are 16-bit unassigned integers. They work as a communicator for the devices and the applications. When improperly secured they can allow unauthorised access.

87
New cards

ZigBee Protocol

Protocol/standard for IoT security. Very common, but also very vulnerable as a result.

88
New cards

Stored vs. Reflected XSS

Stored - Code injected directly into a database/server through forum post or user profile. Targets all users on a website.

Reflected - Clicking a link with harmful code. Can manifest as phishing emails. Targets fewer users and results in less damage.

89
New cards

Insider Threat Statistics from Verizon Data Breach Investigations Report 2023

Percentage of data breaches attributable to internal actors was approximately 35%

90
New cards

Methods of Vishing

Caller ID spoofing - Displaying a different number than the one actually calling.

Deepfake voice technology - Impersonating another person to establish trust between visher and victim.

91
New cards

Maltego

An application for OSINT that has a search function, graphing for large data sets, and allows for real-time and active monitoring of social media.

92
New cards

Banner Grabbing

Technique used to grab information of a software’s type and version by reading the banner displayed by a host. Active banner grabbing is done by sending packets to a remote server and reading response data. Passive banner grabbing is done through third-party services and malware.

93
New cards

Shodan

Search engine for IoT devices. “A search engine of search banners” that returns information about the server software, what options the service supports, a welcome message or anything else that the client can find.

94
New cards

Zenmap

A GUI for Nmap that visualises Nmap’s normal output, even alowing users to draw topology maps. This also users to compare two scans and to repeat the same scan multiple times with command profiles.

95
New cards

Nmap

An industry standard network scanner that finds hosts and services on a network by sending packets and analysing responses. It can:

  • Fast scan – Performing a basic port scan for fast result.

  • Port scanning – Enumerating the open ports on target hosts.

  • Ping Scan – Check host by sending ping requests.

  • TCP/IP stack fingerprinting – Determining the operating system and hardware characteristics of network devices based on observations of network activity of said devices.

96
New cards

Segmented Network Topology (Most likely for MTPH)

Dividing a network up into several subnets or segments, each acting like a micro network. With network segmentation, administrators can control how traffic flows according to granular policies. Improves performance and security.

97
New cards

Mirai

Malware that “infects” IoT devices for remote access and control.