Cyber Security + CompTIA Doman 1

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/68

flashcard set

Earn XP

Description and Tags

All the related info for the Domain 1 of the Cyber Security + CompTIA

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

69 Terms

1
New cards
Physical Attacks Examples
* Tailgating
* Shoulder Surfing
* Dumpster diving
* Target individual
* Ear Dropping
* Physical Smart cards
* **Malicious USB devices**
* \
2
New cards
Eliciting Information
* Casual Conversating
* Talking about ourselves.
* Offering Advice.
* Disagreement
* **Provocative statements.**
* Bracket
* make vague statement
* flattery
* False Statement
* Artificial Ignorance
* Complaining
3
New cards
Phising
Give up personal info
4
New cards
Spear Phishing
Target Specific groups with Phishing
5
New cards
Whaling
Target top executives
6
New cards
Vishing
phishing over voice messages
7
New cards
Smishing
phishing over text
8
New cards
Spam
unsolicited email. aka irritant
9
New cards
Spim
Spam over messaging
10
New cards
Attract Vectors
Methods of attack
11
New cards
Example of Attract Vectors
Direct Access, Wireless, Emails, Supply Chain, Social Media, Cloud
12
New cards
Social Engineering Attacks
2 types, Physical Attacks | Virtual Attacks
13
New cards
Physical Attacks in Social Engineering
Tailgating, Shoulder Surfing, Dumpster diving, Eliciting Information
14
New cards
Virtual Attacks in Social Engineering
Phishing, Spear Phishing, Whaling, Vishing, Hoax, Watering Whole Attack
15
New cards
Hoax
intent is to frighten and mislead recipients and get them to do something with fear
16
New cards
watering whole attacks
Targets groups of users by infecting websites that they commonly visit
17
New cards
pharming
online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
18
New cards
Shadow IT
good intended actions like using tool to make you job efficient but it will turn out bad cause it is not in the policies
19
New cards
Threat Intelligence Sources: Cyber-threat intelligence gathering examples
Open-Source Intelligence (OSINT)

Closed/proprietary

Vulnerability Databases

Public/Private info sharing

Dark Web

Indicators of compromise

Automated Indicators Sharing (AIS)

Structured Threat Information Expression(STIX)/Trusted Automated Exchange of Intelligence Infor (Taxii)

Predictive ANalysis

THreat Maps

File/code Repositories
20
New cards
Open Source Intelligence (OPINT)
Cyber-threat intelligence gathering free of charge.
21
New cards
Closed/Proprietary
Vendor-Specific threat intelligence limited to paying customers
22
New cards
Vulnerability Database
sources that shows known vulnerabilities.
23
New cards
Public/Private Information Sharing Center
Any group that shares Cyber intelligence in various forms
24
New cards
Dark Web
So yeah. You know it.
25
New cards
Indicator of Compromises
Pieces of forensic Data
26
New cards
Automated Indicator Sharing(AIS)
allows organizations to share and access real-time cyber threat intelligence and threat information without revealing sensitive detail about their networks and systems.
27
New cards
Trusted Automated Exchange of Intel Info Taxii
Standard how AIS share via services/ message Exchange
28
New cards
STIX
using TAXII and define the APi for AIS aka language for TAXII
29
New cards
Predictive Analysis
to make data-driven decisions based on heuristics and patterns from previous events
30
New cards
Threat maps
real time map of the computer security attacks
31
New cards
File/code Repositories
Code share like GitHub
32
New cards
Vendor’s Website
Vendors keep track the Vulnera
33
New cards
Vulnerability feed
\
security operations by providing data about security vulnerabilities and related cyber threat intelligence to reduce cyber risks and streamline investigation and response.
34
New cards
Conference
Network with experts
35
New cards
Academic Journal
Paper bout Cyber Attacks
36
New cards
request for comments RFC
specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
37
New cards
Local Groups
learn people from near you.
38
New cards
Threat Feed
Free/Paid delivery info about the important threats to you

\
39
New cards
TTP
Tactic, technique, procedures for hackers
40
New cards
Threat Hunting
Dynamic ways to find/hunt Cyber Threats inside of the network
41
New cards
Intelligence
Gov and industry gather’s, analyze and share info about threat of cyber kind
42
New cards
Threat Feed
Enables organi informed about indicators of compromise IOCs
43
New cards
Advisories/Bulletin
Gov/private share how to defend from cyber threats
44
New cards
Credential Scan
powerful and higher privilege's that a non credential scanner. Goal to find exploits that related to privilege's access
45
New cards
Non-Credentialed Scan
Scan for lower credentialed Scanner where attacker would easily find
46
New cards
Maneuver
org disguising its sys so hard to find them infor
47
New cards
Non-Intrusive Scan
Passive and merely Report vulnerabilities
48
New cards
Intrusive Scan
damageful cause it tries to exploit the vulnerability
49
New cards
Configuration Review
Config compliance Scanner
50
New cards
Network Scan
scan at computer/devices on yout network
51
New cards
Application Scanner
vulner for apps
52
New cards
Web App Scan
be like a search engine looking for vulera
53
New cards
Common Vulnera and Exposures CVS
list of publicly document disclosed vulnera
54
New cards
Common Vulnera Scoring System
over all score for the volunra
55
New cards
Secruity Infor Event Manager SIEM
a sys where all the collected data that real time monitor, analysis, correlations and notification of protentional attack
56
New cards
Security Orchesration Automation and Response
Centralized Aler/Responce automation with in specific threat by learning from ML AI and SIEM
57
New cards
SIEM functionalities
Log Collectors = collects info from syslog and servers

Log Aggregation = Correlate and aggregate events for future identifying attacks

Packer Capture = Packet capture and analysis in the local network

Data Inputs = Collects data from massive of data from various sources

User Entity Behavior Analysis = normal behaviors from a user

Sentiment Analysis = AI and ML to identify attacks

Security Monitoring = Real-time protection and event monitoring

Event Reporting = place that has all the essential for the function and report of event

\
58
New cards
AI
Does Smart Task combining ML and DL
59
New cards
ML
Subset of AI, algorithms that improves over time by experience and use of data
60
New cards
DL
Subfield of ML that function as Artificial Neural Networks
61
New cards
SOAR
de
62
New cards
Lateral movement
move to other devices after the initial access
63
New cards
pivoting
aka island hopping
64
New cards
Passive reconnaissance
Getting intel without interacting directly with target. Purpose is that target does not know being targeted
65
New cards
Passive Reconnaissance Examples
war driving

Drone

War flying

OSINT
66
New cards
Active Reconnaissance
get intel by directly interacting with target where target might notice for being target
67
New cards
Active Reconnaissance
ping Sweep

Tracert Analysis

Nmap

Extracting DNS info
68
New cards
Foot Printing
technique to gather info to use in for penetrations
69
New cards
Testing Teams
White team = judges

purple = process improvements by intermediary between blue and read teams