INMT 543 Exam 1

5.0(1)
studied byStudied by 12 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/107

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

108 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, Availability

2
New cards

Confidentiality

only authorized individuals may access information

3
New cards

Confidentiality attacks

Phishing, password attacks

4
New cards

Integrity

Ensures information is correct and unaltered

5
New cards

Integrity attacks

SQL injection (alter data once you are in the system)

6
New cards

Availability

Ensures information is accessible to authorized users

7
New cards

Availability attacks

Denial of Service (server unresponsive)

8
New cards

Nonrepudiation

user can't deny that they performed the action

9
New cards

Cybercriminal: competitors

Launch attacks against an opponent's system to steal classified information.

10
New cards

Cybercriminal: Criminal syndicates

Move from traditional criminal activities to more rewarding and less risky online attacks

11
New cards

Cybercriminal: shadow IT

Employees become frustrated with the slow pace of acquiring technology, so they purchase and install their own equipment or resources in violation of company policies

12
New cards

Cybercriminal: brokers

Sell their knowledge of a weakness to other attackers or governments.

13
New cards

Cybercriminal: cyberterrorists

Attack a nation's network and computer infrastructure to cause disruption and panic among citizens

14
New cards

White hat hacker

ethical attackers, they attempt to probe a system (with an organization's permission) for weaknesses and then privately provide that information back to the organization.

15
New cards

Black hat hacker

violate computer security for personal gain (such as to steal credit card numbers) or to inflict malicious damage (corrupt a hard drive).

16
New cards

Gray hat hacker

attempt to break into a computer system without the organization's permission (an illegal activity) but not for their own advantage; instead, they publicly disclose the attack in order to shame the organization into taking action.

17
New cards

Legacy platforms

Limited or non-existent vendor support

18
New cards

On-premises platforms

System sprawl and poor configuration

19
New cards

Cloud platforms

Poor visibility; global availability

20
New cards

Patching challenges

Difficulty patching firmware Few patches for application by non-major vendors Delays in patching OSs

21
New cards

Configuration vulnerabilities

Default settings, open ports and services, unsecured root accounts, open permissions, unsecure protocols, weak encryption

22
New cards

Third-party vulnerabilities

System integration can cause the need for workarounds for incompatible systems. Lack of vendor support.

23
New cards

Zero-day attacks

Vulnerabilities can be exploited by attackers before anyone else even knows it exists

24
New cards

Attack vectors

Pathway or avenue used by a threat actor to penetrate a system

25
New cards

Attack vector examples

Email, wireless, removable media, direct access, social media, supply chain, cloud

26
New cards

Social engineering: authority

impersonate an authority figure or falsely cite their authority

27
New cards

Social engineering: intimidation

frighten and coerce by threat

28
New cards

Social engineering:consensus

To influence by what others do

29
New cards

Social engineering: scarcity

To refer to something in short supply

30
New cards

Social engineering: urgency

demand immediate action

31
New cards

Social engineering: familiarity

give the impression the victim is well known and well received

32
New cards

Social engineering: trust

inspire confidence

33
New cards

Phishing: spear phishing

very small number of people targeted (attacker knows more about these

34
New cards

Phishing: whaling

targeting high profile individual (CEOs, celebrities, politicians)

35
New cards

Phishing: vishing

voice phishing

36
New cards

Phishing: smishing

message service (SMS) text messages and callback recorded phone messages

37
New cards

Phishing: watering hole

executives all tend to visit a common website, such as that of a parts supplier to the manufacturer

38
New cards

Redirection: typosquatting

1 character missing from email or website

39
New cards

Redirection: pharming

IP resolution. Exploits how a URL such as www.cengage.com is converted into its corresponding IP address 69.32.308.75. A threat actor may install malware on a user's computer that redirects traffic away from its intended target to a fake website instead

40
New cards

Physical social engineering examples

Dumpster diving tailgating, shoulder surfing

41
New cards

Red team

Attackers. Scans for vulnerabilities and then exploits them

42
New cards

Blue team

Defenders. Monitors for Red Team attacks and shores up defenses as necessary

43
New cards

White team

Referees. Enforces the rules of the penetration testing

44
New cards

Purple team

Bridge. Provides real-time feedback between the Red and Blue Teams to enhance the testing

45
New cards

War driving

Deliberately searching for Wi-Fi signals while driving by in a vehicle

46
New cards

War driving: mobile computing device

wireless NIC. Portable computer, pad computer, smartphone

47
New cards

War driving: wireless NIC adapter

external wireless NIC adapter that connects into a USB or other port and has an external antenna jack

48
New cards

War driving: global position system (GPS) receiver

Pinpoints location

49
New cards

Rules of engagement (pen testing)

Timing, scope, authorization, exploitation, communication, cleanup, and reporting

50
New cards

Vulnerability scanning: credentialed scan

valid authentication credentials are supplied to the vulnerability scanner

51
New cards

Vulnerability scanning: non-credentialed scan

provides no authentication information

52
New cards

Vulnerability scanning: intrusive scan

may impair network functions (automatically closes a port)

53
New cards

Vulnerability scanning: non-intrusive scan

does not attempt to exploit the vulnerabilities but only records them

54
New cards

Security Information and Event Management (SIEM)

Collects and consolidates data and logs from a wide range of network appliances and applications. Aggregation Correlation Time synchronization Event deduplication Logs

55
New cards

Security Orchestration, automation, and Response (SOAR)

designed to help security teams manage and respond to security warnings and alarms. Combines more comprehensive data gathering and analytics to automate incident response.

56
New cards

Standard frameworks

NIST RMF, NIST CSF, ISO 27000

57
New cards

Imprison

Ransomware, cryptomalware

58
New cards

Launch

Computer virus (file virus< fileless virus (loaded into RAM), worm bot

59
New cards

Snoop

Spyware (keylogger)

60
New cards

Deceive

Trojan, Remote Access Trojan (RAT)

61
New cards

Evade

Backdoor, logic bomb, rootkits

62
New cards

File-based: appender infection

Attacker injects virus code to bottom of the code

63
New cards

File-based: split infection

Spreads virus code in broken pieces across the program's code

64
New cards

File-based: Metamorphic structure

Constantly changes structure of virus code

65
New cards

Computer worms

Enters through the network. Doesn't modify program code. Exploits vulnerabilities in software or OS and searches for a different endpoint in the network with the same vulnerabilities Deletes files, slows networks, allows remote control

66
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

67
New cards

Crypto-malware

Steals your computing power to mine cryptocurrency. Asks for cryptocurrency to reduce traceability

68
New cards

Trojan

executable program that masquerades as performing a benign activity but also does something malicious

69
New cards

Remote Access Trojan (RAT)

basic functionality of a Trojan but also gives the threat agent unauthorized remote access to the victim's

70
New cards

Potentially Unwanted Programs (PUPs)

Software that users do not want on their computer. become installed along with other programs and are the result of the user overlooking the default installation options on software downloads

71
New cards

Bots/zombie

Allows the infected computer to be under the remote control of an attacker

72
New cards

Bot herder

the controller of hundreds, thousands, or even millions of bot computers are gathered into a logical computer network (botnet)

73
New cards

Backdoor

Negates normal authentication procedures to access a system. Used by developers for easier access during development

74
New cards

Logic bomb

Lies dormant and evades detection until a specific logical event triggers it. Manually triggered Time triggered Event triggered

75
New cards

Rootkits

Hides its presence on the computer by accessing "lower layers" of the OS to make alterations. Infects your computer with malware before the OS is loaded

76
New cards

Cros-site scripting (XSS)

Vulnerability: A website that accepts user input without validation Exploit: The attacker injects malicious scripts into the target website Infection: The website sends the malicious script to the victim's browser.

77
New cards

Cross-Site Request Forgery (CSRF)

Victim unknowingly submits a maliciously crafted web request while authenticated to a certain account. The new page inherits the identity of the victim to perform an undesired function on the attacker's behalf

78
New cards

Server-Side Request Forgery (SSRF)

uses a payload like a URL to force the server to make unauthorized requests to other servers

79
New cards

Buffer overflow

A technique for crashing by sending too much data to the buffer in a computer's memory

80
New cards

Integer overflow

the result of an arithmetic operation—such as addition or multiplication—exceeds the maximum size of the integer type used to store it

81
New cards

Driver manipulation

A shim can be created to allow a driver to run on an OS that the driver had compatibility issues with. Adding a shim could introduce a flaw by accident or on purpose if the hacker created the shim. Example: tricking a device driver to work with an older version of Windows (compatibility mode) to bypass some security controls

82
New cards

Open-Source Intelligence (OSINT)

Information that is readily available to the public and doesn't require any type of malicious activity to obtain.

83
New cards

Cyber Information sharing and collaboration program (CISCP)

Analyst-to-analyst technical exchanges, CISCP analytical products, cross-industry orchestration, Digital malware analysis. Open-source

84
New cards

Concerns of open-source sources

Privacy and Speed (automated indicator sharing (AIS) can help)

85
New cards

Closed source information

Proprietary. Restrict both access to data and participation

86
New cards

Secure coding techniques: Confirming

Secure booting

87
New cards

Secure coding techniques: Protecting

Different types of malware-scanning

88
New cards

Secure coding techniques: hardening

Disabling unnecessary ports and services Disabling default accounts/passwords Employing least functionality

89
New cards

Secure coding techniques: proper input validation

Accounting for errors, such as incorrect user input. Can mitigate XSS and CSRF attacks

90
New cards

Secure coding techniques: obfuscation

Making the inner functionalities of a code hard to understand for outsiders. Adding purposefully incorrect code that will never be executed. Using fake or misleading variable names. Encrypting part of the code

91
New cards

Securing coding techniques: dead code

Section of the code that executes but performs no meaningful functions. Creates an unnecessary attack surface

92
New cards

Securing coding techniques: SDK

Code reuse of third-party libraries. Vetted to detect and eliminate vulnerabilities.

93
New cards

Mobile device: physical security

lost or stolen

94
New cards

Mobile device: limited updates

closed or proprietary

95
New cards

Mobile device: location tracking

vulnerable to targeted physical attacks. Privacy issues

96
New cards

Mobile device: unauthorized recording

spying through malware

97
New cards

Mobile management tools

Mobile Device Management (MDM). Passcodes, PINs, screen lock, on-body detection, trusted places, trusted devices, trusted face, trusted voice

98
New cards

Internet of Things (IoT)

connecting any device to the Internet for the purpose of sending and receiving data to be acted upon

99
New cards

IoT Power constraint

To prolong battery life, devices and systems are optimized to draw very low levels of power and thus lack the ability to perform strong security measures

100
New cards

IoT Compute constraint

Due to their size, small devices typically possess low processing capabilities, which restricts complex and comprehensive security measures.