Intro to cyber security

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/91

flashcard set

Earn XP

Description and Tags

Lecture 1

Last updated 9:58 PM on 3/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

92 Terms

1
New cards

Security-focused Dev Thought

  1. Adversarial thinking required

  2. Your code has an intelligent opponent

  3. They have time,motivation,and creativity

  4. They only need to win once

2
New cards

Thinking like an attacker

  1. Physical manipulation of the mechanism(can I pick the lock)

  2. Social engineering or theft(Can I copy someone else’s key)

  3. Exploiting trust relationships(Can I trick staff into giving me a key)

  4. Alternative attack vectors(Can I just climb through the window)

3
New cards

Roadmap

  1. Linux Foundations

  2. Finding Information

  3. CIA Triad

  4. Risk and Controls

  5. Threat Modelling

  6. Kill Chain

4
New cards

Linux Foundations

essential tools for security practitioners

5
New cards

Finding Information

Staying current in a rapidly evolving field

6
New cards

CIA Triad

The fundamental goals of cybersecurity

7
New cards

Risk and controls

Strategic approaches to managing threats

8
New cards

Threat Modeling

Systematic framework for security analysis

9
New cards

Kill Chain

Understanding the attackers playbook

10
New cards

The operating system of security

Linux

11
New cards

Kali Linux

The industry-standard penetration testing distribution, pre-loaded with hundreds of security tools

12
New cards

Security Onion

Network security monitoring platform for intrusion detection, log management, and enterprise security monitoring

13
New cards

Cloud Infrastructure

Most cloud containers and servers run Linux variants, making command-line proficiency essential for cloud security

14
New cards

Analysis Sandboxes

Malware analysis environments rely on Linux for safe investigation and reverse engineering of threats

15
New cards

You need to find all failed login attempts in a 2GB log file to investigate a potential breach

  1. GUI Approach

  2. Command Line Approach

16
New cards

GUI Approach

  1. Open file manager

  2. Wait for file to load

  3. Application crashes

  4. Give up

Time wasted: 10+ minutes

17
New cards

Command line Approach

grep "Failed password" /var/log/auth.log >

failed_logins.txt

18
New cards

Advantages of Command Line Approach

  1. Automation at scale

  2. Speed for larger datasets

  3. Scriptable and repeatable

  4. Low memory overhead

  5. Works remotely over SSH

19
New cards

Essential Linux Commands: Navigation

  1. pwd: print working directory

  2. ls: list files and folders

  3. cd/path/to/directory: change directory

  4. ls*.log: show only log files

20
New cards

Essential Linux Commands: Reading Files

  1. cat file.txt: dump entire file to screen

  2. less file.txt:Paginate with search

  3. head -n 20: First 20 lines

  4. tail -f: last lines, live updates

  5. grep “error” file.txt: find specific lines

21
New cards

Every linux file has permissions that control read,write, and execute access. Which command reveals these permissions?

ls -la

22
New cards

Three Linux permission types

  1. Read: r

  2. Write: w

  3. Execute: x

23
New cards

Permission groups apply to?

  1. Owner

  2. Group

  3. Others

Example output: -rwxr-xr-x

rwx: owner

r-x: Group

r-x: Others

24
New cards

Key commands

  1. chmod: Change permissions

  2. chown: Change ownership

  3. sudo: Execute as superuser

25
New cards

Why are permissions security-critical?

Privilege escalation attacks frequently exploit incorrect file permissions

26
New cards

Common real-world failure?

  1. Sensitive configuration file has world-readable permissions

  2. Attacker reads database credentials

  3. Lateral movement to database server

  4. Game over

27
New cards

Network Commands

  1. ip addr

  2. ss -tulpn

  3. curl

  4. ping

28
New cards

ip addr

Network interfaces and IP addresses

29
New cards

ss -tulpn

Listening ports and associated processes

30
New cards

curl

Making web requests safely from CLI

31
New cards

ping

Testing network reachability

32
New cards

Linus’s Law

Given enough eyeballs, all bugs are shallow

-Open source is safer because anyone can audit the code

33
New cards

Why can open source still be insecure?

Public code gives adversaries a roadmap. Malicious actors can study the source systematically to discover vulnerabilities before defenders

34
New cards

What is a patch gap?

Time between vulnerability disclosure and patch application

35
New cards

Advantages of open source

Fixes are published transparently, and the community can verify patches meet security standards

36
New cards

Disadvantages with open source

Everyone sees the vulnerability when it’s announced, creating a race between defenders patching and attackers exploiting

37
New cards

Average time to exploit

5.5 days after disclosure

38
New cards

Average time to patch

38 days

39
New cards

What does CVE stand for?

Common Vulnerabilities and Exposures

40
New cards

Purpose of CVE

A standard identifier for publicly known security flaws, used globally by vendors, researchers, and security tools.

41
New cards

CVE format

CVE-YEAR-NUMBER

42
New cards

Why does CVE matter operationally

  1. Allows constant communication across organisations

  2. Automated vulnerability scanning

  3. Patch management tracking

  4. Threat intelligence sharing

  5. Compliance reporting

43
New cards

National Vulnerability Database

enriches CVE records with critical context and scoring

44
New cards

CVSS Scoring measure what?

Severity ratings from 0-10 using common Vulnerability Scoring System

45
New cards

Affected Software

Common Platform Enumeration strings identifying vulnerable products and versions

46
New cards

References

Links to vendor patches, advisories, and technical analysis

47
New cards

CVSS Severity Ranges

0.0-3.9:Low

4.0-6.9: Medium

7.0-8.9: High

9.0-10.0: Critical

48
New cards

Three Pillars of CIA Triad

  1. Confidentiality

  2. Integrity

  3. Availability

49
New cards

Confidentiality

Only authorised parties can access information

50
New cards

Integrity

Data cannot be altered undetectably

51
New cards

Availability

System are accessible when needed

52
New cards

Confidentiality Controls

  1. Encryption

  2. Access Control list

  3. Multi-Factor Authentication

53
New cards

Integrity Controls

  1. Cryptographic Hashing

  2. Digital Signatures

  3. Write-Once Storage

  4. Version Control

54
New cards

Availability Control

  1. Redundancy

  2. Load Balancing

  3. DDoS Mitigation

  4. Rate Limiting

  5. Offline Backups

55
New cards

CIA Triad Trade offs

  1. Confidentiality vs. Availability

  2. Integrity vs.Availability

56
New cards

Confidentiality vs. Availability

max confidentiality=air-gapped system

result: Not remotely available to legitimate users

57
New cards

Integrity vs. Availability

Blockchain

result: Slow write operations, reduced availability for high-throughput applications

58
New cards

Return to CVSS

  1. Attack Vector

  2. Attack Complexity

  3. Privileges Required

  4. User Interaction

  5. Scope

  6. Impact: C/I/A

59
New cards

Attack Vector

Network scores highest:remotely exploitable

-Adjacent,Local,Physical score progressively lower

60
New cards

Attack Complexity

-low: easy exploitation

-high: requires special conditions beyond attacker control

61
New cards

Privileges Required

None: no authentication needed

Low/High: privileges required score lower

62
New cards

User Interaction

None: automatic exploitation

Required:victim must be tricked

63
New cards

Scope

Changed: affects resources beyond security scope

Unchanged: stays within boundaries

64
New cards

Impact:C/I/A

Confidentiality,Integrity,Availability rated None/Low/High based on data affected

65
New cards

Threat Modelling

  1. Asset and Policy(what)

  2. Adversary(who)

  3. Mechanism(how)

66
New cards

Threat Model 1: Confidentiality

Threat: Network eavesdropper

67
New cards

Threat Model 2: Integrity

Malicious relay/server

68
New cards

Threat Model 3: Availability

DDoS attacker

69
New cards

Confidentiality: end-to-end encryption defense

Only sender and receiver can read messages

70
New cards

Integrity: Cryptographic signatures defense

Tampering detection

71
New cards

Availability: Scale and rate limiting defense

Automatic provision of additional server capacity during traffic spikes to maintain service levels

72
New cards

When security fails

when mechanism can’t enforce policy against adversary

73
New cards

Failure Modes

  1. Weak mechanism vs. advanced adversary

  2. Overwhelmed Mechanism

  3. Bypassed Mechanism

74
New cards

Risk Formula

Likelihood*impact

75
New cards

Likelihood definition

Probability the threat occurs(0-100%)

76
New cards

Impact definition

Damage if it happens

77
New cards

What are the ways to handle risk?

  1. Accept: risk is low enough to tolerate

  2. Avoid:Don’t do the risky activity

  3. Mitigate: Reduce likelihood or impact

  4. Transfer: Insurance or outsource to third-party vendor

78
New cards

Types of Security Controls

  1. Administrative control: Policies, procedures, training

  2. Technical control: Software/hardware enforcement

  3. Physical control: Locks, badges, cameras

79
New cards

Administrative Controls advantages

Low cost to implement

80
New cards

Administrative Controls Disadvantages

Relies on human compliance

81
New cards

Technical Controls Advantages

Consistent enforcement

82
New cards

Physical Controls Advantage

Effective against local threats

83
New cards

Physical Controls Disadvantage

No protection against remote attacks

84
New cards

Modern security Architectures

  1. Defence in Depth

  2. Zero Trust

85
New cards

Defence in depth principles

  1. Don’t rely on a single defence

86
New cards

Zero Trust principles

  1. No implicit trust based on location

  2. Every request authenticated and authorised

  3. Assume breach at all times

  4. Least privilege access

87
New cards

Cyber kill chain

  1. Models attacks as a sequence of stages, not isolated events

  2. Breaking any stage will stop the attack

  3. Helps prioritise defensive investments

  4. Reveals dependencies in attacker workflows

88
New cards

Kill Chain Stages

  1. Reconnaissance:Information gathering

  2. Weaponisation: Crafting exploit

  3. Delivery:Getting exploit to victim

  4. Exploitation: Triggering vulnerability

  5. Installation: Persistence

  6. Command and control: Remote Control

  7. Actions on Objectives: Data theft/damage

89
New cards

Key legal rule in security testing

Authorisation matters more than intent

90
New cards

Cybercrime penalties include

Fines and imprisonment

91
New cards

Responsible disclosure requires

Private reporting and time to patch

92
New cards

Professional Pentesting Rules

  1. Required before testing: Written authorisation

  2. During testing: Stay in scope, document everything

  3. After testing: report responsibly and delete data

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)