IB Computer Science P3 Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/73

flashcard set

Earn XP

Description and Tags

Vocabulary for IB Computer Science Paper 3 M26 & N26

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

What is PTES/PenTES?

Penetration Testing Execution Standard

2
New cards

What is PenTES for?

A framework for conducting penetration testing; a structured approach to testing and reporting results

3
New cards

How many phases in PenTES?

7 phases

4
New cards

Phase 1 is…?

Pre-engagement interactions

5
New cards

What happens in phase 1?

Preperation, getting document approvals, putting together needed tools

6
New cards

Why is phase 1 important?

Needed so that testing aligns with security needs and operational requirements of system

7
New cards

Aspects of Phase 1

1.1 Goal setting and identifying targets

1.2 Defining scope and rules of engagement

1.3 Testing approaches

8
New cards

1.1 Goal setting and identifying targets

Objectives established after finding key concerns; specific targets and high risk areas identified

9
New cards

1.1 Examples of key concerns

Patient data integrity

Uninterrupted service delivery

Compliance with health sector regulations

10
New cards

1.1 Examples of high risk areas

Patient record databases

IoT enabled medical devices

11
New cards

1.2 Defining scope and rules of engagement

Confirms which parts of the system are being tested to avoid disruption; rules of engagement agreed upon by team and client to understand methods and extent of PenTES

12
New cards

1.3 Testing approaches

Black box testing

White box testing

Grey box testing

13
New cards

Black box testing

Attack simulated from perspective of an uninformed external hacker, looks at surface level issues

14
New cards

White box testing

Analysis with full in-depth information of client’s system, requires access to network diagrams, system configurations, and known issues

15
New cards

Grey box testing

Mixture of black and white testing, uses partial knowledge of systems. Simulates inside threat or external attack with partial insider info

16
New cards

Phase 2 is…?

Intelligence gathering

17
New cards

What happens in phase 2?

Team collects data from outside sources like social media or official records to be then analysed. Categorised as OSINT.

18
New cards

What is OSINT?

Open-Source Intelligence (Phase 2)

19
New cards

Aspects of Phase 2

2.1 OSINT Techniques

2.2 Other Techniques

20
New cards

2.1 OSINT Techniques

Utilisation of tools and sources like search engines, social media, forums, internet-facing resources

21
New cards

2.1 Examples of info gathered with OSINT Techniques

Employee details - Found through employee social media, specifically IT/Admin staff

Technology usage - Insight into client software and hardware, through forums

Security policies - Looks at publicly available security policy amd procedures

22
New cards

2.2 Other Techniques

Targeted information

Network Scanning + Mapping

Social Engineering reconnaissance

23
New cards

2.2 Targeted Information

Uses advanced search techniques (search engine dorking) to find exposed sensitive files or login portals

24
New cards

Search engine dorking

Technique using complex search queries to find information not easily accessible with normal searches

25
New cards

2.2 Network Scanning + Mapping

Using advanced network mapping to learn network topologies (servers, firewalls, other devices). IP addresses of all devices on network catalogued to understand scope of network.

26
New cards

2.2 Examples of key network scanning and mapping activities

Port scanning - technique to identify open ports and services on target network device

OS detection - Remote scanning of target host that sends back details of the OS if there is a match

Network topology mapping - Graphing a network’s topology with all its nodes and links

27
New cards

2.2 Social engineering reconnaissance

Uses vishing (voice phishing) or pretexting (uses a pretext to get sensitive info) to get information from employees

28
New cards

Phase 3 is…?

Threat modelling

29
New cards

What happens in phase 3?

Potential threats and/or vulnerabilities are identified, strategies to stop them are developed; a detailed threat analysis is conducted

30
New cards

Aspects of Phase 3

3.1 Identifying potential adversaries

3.2 Assessing hacker capabilities and intentions

3.3 Methods of exploitation

3.4 Valuable asset evaluation

3.5 Prioritization of security efforts

31
New cards

3.1 Identifying potential adversaries

Determines who might target the network; e.g. cybercriminals seeking patient data or insiders with network access

32
New cards

3.2 Assessing hacker capabilities and intentions

Analyse what potential hackers are capable of and how they might use accessed data.

33
New cards

3.3 Methods of exploitation

Document how hackers might exploit system weaknesses; e.g. malware deployment, social engineering attacks, network attacks

34
New cards

3.4 Valuable asset exploitation

Determine which assets are most critical and look at potential impact of compromise; e.g. EHRs

35
New cards

3.5 Prioritization of security efforts

Use prior analysis to guide the focus of PenTES; most valuable and vulnerable areas get the most attention.

36
New cards

Phase 4 is…?

Vulnerability analysis

37
New cards

What happens in phase 4?

Vulnerabilities that could be used by a hacker are identified and confirmed through manual and automated tools; guides next steps of PenTES

38
New cards

Aspects of Phase 4

4.1 Scanning

4.2 Manual examination

4.3 Assessment of weaknesses

4.4 Prioritisation

39
New cards

4.1 Scanning

Team uses automated tools to quickly find known vulnerabilities; e.g. unpatched software or insecure configurations

40
New cards

4.2 Manual examination

Combines automation with manual checks to detect subtler flaws and vulnerabilities that need expert analysis

41
New cards

4.3 Assessment of weaknesses

Evaluates vulnerabilities found to see potential impact of hacker exploitation

42
New cards

4.4 Prioritisation

Determines which flaws are most important based on factors like ease of exploitation and potential damages

43
New cards

Phase 5 is…?

Exploitation

44
New cards

What happens in phase 5?

Attempts are made to breach the system with vulnerabilities from phase 4.

45
New cards

Aspects of Phase 5

5.1 Targeted Breaching Attempts

5.2 Exploit development

5.3 Employing various techniques

5.4 Assessing impact

46
New cards

5.1 Targeted Breaching Attempts

Team uses specific techniques to exploit known vulnerabilitie, test defenses

47
New cards

5.2 Exploit development

Team crafts custom scripts/tools tailored to specific known vulnerabilities

48
New cards

5.3 Employing various techniques

Team will use some or all of the listed techniques depending on known vulnerabilities; SQL injection, cross-site scripting (X-SS), buffer overflow attacks, password cracking tools.

49
New cards

5.4 Assessing the impact

Now, team tries to understand the potential damages or access that can be caused by successful exploitation

50
New cards

Phase 6 is…?

Post-exploitation

51
New cards

What happens in phase 6?

If access is gained from phase 5, the focus is now on keeping control of the system and getting data from it; let's team to comprehend full scope and scale of a breach

52
New cards

Aspects of Phase 6

6.1 Data Access and analysis

6.2 Privilege escalation

6.3 Establishing persistence

6.4 Operational impact assessment

6.5 System forensics and malware analysis

53
New cards

6.1 Data access and analysis

Investigated the types of sensitive data available after a breach; e.g. patient records, admin data, confidential information

54
New cards

6.2 Privilege escalation

Examines how escalating user privileges can increase access within the network

55
New cards

6.3 Establishing persistence

Evaluated ways a hacker could maintain access to the network long term; evaluates possible severity of breach

56
New cards

6.4 Operational impact assessment

Assess potential impact of breach on hospital services and patient safety

57
New cards

6.5 System forensics and malware analysis

Analyse any traces left by exploitation process by looking at system logs or looking at changes made to system configurations (system forensics): also through detecting malware implants

58
New cards

Phase 7 is…?

Reporting

59
New cards

What happens in phase 7?

Everything prior is documented and presented to the client in a report.

60
New cards

Aspects of Phase 7

7.1 Vulnerability and exploitation details

7.2 Actionable recommendations

7.3 Security posture assessment

61
New cards

7.1 Vulnerability and exploitation details

Part of the report that gives an overview of vulnerabilities found, methods used to exploit them, and possible impact

62
New cards

7.2 Actionable recommendations

Provides suggestions prioritised for mitigating security risks and strengthening network defenses

63
New cards

7.3 Security posture assessment

Holistic analysis of overall strengths and weaknesses, offering future focus and areas for improvement

64
New cards

Outcome of Phase 7

Allows team to develop response plan (includes incident detection, response strategies, recovery processes); guides clients efforts in improving cybersecurity and responses to hackers

65
New cards

Ethical considerations

When doing any PenTES, ethics are vital especially in healthcare. This includes:

  • proper authorisation

  • data confidentiality and integrity

  • non-disruption of services

  • reporting and responsiveness

66
New cards

Malware

Software designed to disrupt, damage, or provide unauthorised access to a system.

67
New cards

Uninterrupted service delivery

No downtime, no interruptions, minimal lag when accessing patient information

68
New cards

Hacker

Person who breaks into computer systems

69
New cards

Security posture assessment

(Outcome of Phase 2) In-depth analysis of a system’s internal and external defenses to evaluate overall effectiveness of security measures.

70
New cards

SQL Injection

A code injection technique used to attack data-driven applications; can cause damages and even destroy a database (Phase 5)

71
New cards

Cross-site scripting (X-SS)

Injecting malicious scripts in applications or websites trusted by a target user (Phase 5)

72
New cards

Buffer overflow attacks

Exploitation of a coding error (buffer overflow), using malinformed inputs to overwrite memory of an application (Phase 5)

73
New cards

Password cracking tools

Tools/code that are used to guess passwords (Phase 5)

74
New cards

Other sensitive information present in hospitals (Beyond EHRs)

  • Patient profiles —> can contain info connected to other agencies based on their conditions and personal life (i.e. social worker intervention) that can implicate other agencies in a data breach