Cybersecurity 2 Midterm

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/168

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:34 AM on 10/24/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

169 Terms

1
New cards

/etc/passwd

Stores plaintext user information (user ID, group ID, home directory, default shell).

2
New cards

/etc/shadow

Stores encrypted passwords for users - only root can access.

3
New cards

/etc/group

Stores basic information about groups.

4
New cards

chown

Change owner of a file or directory.

5
New cards

chmod

Change read, write, and execute permissions.

6
New cards

chgrp

Change group ownership of a file or directory.

7
New cards

Reconnaissance Attack

Attackers gather information about a target system or network before launching more advanced attacks.

8
New cards

Sniffing Attack

An attacker intercepts and analyzes network traffic to steal sensitive information such as passwords or data.

9
New cards

Man-in-the-Middle Attack

Attackers secretly intercept and alter the communication between two parties.

10
New cards

Password Attack

Unauthorized access using techniques like brute force, dictionary attacks, or credential stuffing to crack passwords.

11
New cards

Privilege Escalation Attack

Attackers gain elevated privileges on a system, such as root or admin access.

12
New cards

DNS Poisoning Attack

Attackers corrupt DNS data to redirect users to malicious sites or systems.

13
New cards

ARP Poisoning Attack

Attackers send fake ARP messages to associate their MAC address with the IP address of another device, enabling eavesdropping or packet interception.

14
New cards

DHCP Starvation Attack

An attacker exhausts the available IP addresses by flooding the DHCP server with bogus requests, preventing legitimate users from obtaining an IP address

15
New cards

DHCP Spoofing Attack

Attackers set up a rogue DHCP server to assign malicious IP settings to users.

16
New cards

MAC Spoofing Attack

Attackers alter their device's MAC address to impersonate another device on the network.

17
New cards

Network-based Denial of Service Attack

An attack that floods a network with excessive traffic, making it unavailable for legitimate users.

18
New cards

Distributed Denial of Service Attack (DDoS)

Attackers use multiple systems to flood a network or service, overwhelming it and causing downtime.

19
New cards

Malware Attack

Attackers install malicious software, such as viruses, trojans, or ransomware, to damage or gain unauthorized access to a system.

20
New cards

Advanced Persistent Threat (APT)

A sophisticated and continuous hacking process where attackers gain access to a system and remain undetected for a long period to steal sensitive information.

21
New cards

SQL Injection Attack

Attackers exploit vulnerabilities in web applications by injecting malicious SQL code into queries, allowing unauthorized access to databases.

22
New cards

Cross-Site Scripting (XSS) Attack

Attackers inject malicious scripts into web pages viewed by users, which can steal session cookies or other sensitive information.

23
New cards

Parameter Tampering Attack

Attackers manipulate parameters exchanged between the client and server to modify data or gain unauthorized privileges.

24
New cards

Directory Traversal Attack

Attackers access restricted directories and execute commands outside the web server’s root directory.

25
New cards

Cross-Site Request Forgery Attack (CSRF)

Attackers trick users into executing unwanted actions on a web application in which they are authenticated.

26
New cards

Application-Level DOS Attack

A denial of service attack targeting the application layer, disrupting services by overloading application resources.

27
New cards

Session Hijacking Attack

Attackers take control of a user session by stealing or predicting session tokens, allowing unauthorized access.

28
New cards

Bluesnarfing

Attackers steal data from a Bluetooth-enabled device without the user's permission.

29
New cards

Bluebugging

Attackers exploit Bluetooth vulnerabilities to take control of a device and remotely execute commands.

30
New cards

War Driving

Attackers drive around with Wi-Fi-enabled laptops to detect open wireless networks.

31
New cards

Client Misassociation

An attacker sets up a rogue access point (AP) outside the corporate perimeter and tricks employees into connecting to it.

32
New cards

Unauthorized Association

Attackers infect a victim machine and activate rogue access points to provide an unauthorized connection to the enterprise network.

33
New cards

Honeypot Access Point Attack

Attackers use fake access points to trap unsuspecting users and steal sensitive information.

34
New cards

Rogue Access Point Attack

Rogue wireless access points placed in an 802.11 network can hijack the connections of legitimate network users.

35
New cards

Misconfigured Access Point Attack

Poorly configured access points allow intruders to steal the SSID and gain access to the network

36
New cards

Ad Hoc Connection Attack

Wi-Fi clients communicate directly in ad hoc mode, bypassing access points and exposing the network to unauthorized access.

37
New cards

AP MAC Spoofing

A hacker spoofs the MAC address of a WLAN client’s equipment to act as an authorized client, eavesdropping on the traffic.

38
New cards

Denial-of-Service Attack

Wireless DoS attacks disrupt network connections by sending broadcast "de-authenticate" commands.

39
New cards

WPA-PSK Cracking

Attackers sniff and capture authentication packets and brute force the WPA-PSK key.

40
New cards

RADIUS Replay

Attackers replay valid RADIUS server responses, authenticating without valid credentials

41
New cards

MAC Spoofing Attack

An attacker spoofs the MAC of a client and attempts to authenticate to the AP, leading to unauthorized network access.

42
New cards

WEP Cracking

Attackers sniff and capture packets, running a WEP cracking program to obtain the WEP key.

43
New cards

Fragmentation Attack

Attackers obtain 1500 bytes of a pseudo-random generation algorithm (PRGA) to forge WEP packets used for injection attacks.

44
New cards

Jamming Signal Attack

Attackers use high-gain amplifiers to flood an area with signal interference, disrupting the legitimate AP.

45
New cards

Supply Chain Attack

Attackers compromise a system by exploiting weaknesses in third-party hardware, software, or services.

46
New cards

Prevent Supply Chain Attacks

vendor assessment, secure communication, code review, digitally signed updates, privileged access management, and adopting zero-trust architectures

47
New cards

Ultimate Goal of Network Defense

To protect an organization’s information, systems, and network infrastructure from unauthorized access, misuse, modification, service denial, or any form of degradation and disruption

48
New cards

Information Assurance (IA)

Ensures defense-in-depth security. These principles enable an organization’s security activities, safeguarding the network against attacks.

49
New cards

Benefits of Network Defense

- Protect information assets.

- Comply with government and industry-specific regulations.

- Ensure secure communication with clients and suppliers.

- Reduce the risk of being attacked.

- Gain a competitive edge by offering more secure services.

50
New cards

Challenges of Network Defense

- Distributed Computing Environments: Modern networks are vast and complex, potentially leading to serious security vulnerabilities, which attackers exploit.

- Emerging Threats: Threats are evolving daily, with network attacks becoming more technically sophisticated and organized.

- Lack of Network Security Skills: Organizations struggle to defend themselves due to a shortage of skilled security professionals.

51
New cards

Approaches to Network Defense

- Preventive Approaches: Techniques to avoid threats or attacks on the target network.

- Reactive Approaches: Methods used to detect attacks when they occur.

- Retrospective Approaches: Techniques to investigate the causes of attacks and contain, remediate, and recover from damage.

- Proactive Approaches: Measures that help anticipate and make informed decisions about potential future attacks.

52
New cards

Administrative Security Control

Policies, procedures, and practices that manage and regulate an organization’s security.

53
New cards

Physical Security Control

Protection of physical infrastructure, such as buildings, servers, and other hardware.

54
New cards

Technical Security Control

Security measures implemented via technology, such as firewalls, encryption, and antivirus software.

55
New cards

Multilayered Security Order

1. Policies

Organizational rules and regulations that dictate how security is managed.

2. Physical

Physical barriers and security mechanisms to prevent unauthorized access to critical infrastructure.

3. Perimeter

Defenses at the boundary of the network, such as firewalls and intrusion detection systems (IDS).

4. Internal Network

Protection mechanisms within the internal infrastructure to prevent insider threats or lateral movement of attacks.

5. Host

Security measures on individual machines or devices, such as antivirus software and patch management.

6. Application

Security practices at the application level, including secure coding and vulnerability patching.

7. Data

Protection of the data itself, through encryption, access control, and backups.

56
New cards

PCI-DSS

Ensures that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

57
New cards

HIPAA

Establishes data privacy and security provisions to safeguard medical information.

58
New cards

GDPR

A legal framework that sets guidelines for the collection and processing of personal data of individuals within the European Union.

59
New cards

SOX

U.S. legislation enacted to improve the accuracy and reliability of corporate disclosures and to protect investors from fraudulent accounting activities.

60
New cards

GLBA

Requires financial institutions to explain how they share and protect their customers' private information.

61
New cards

DMCA

Protects copyrighted material by criminalizing circumvention of copyright-protection systems.

62
New cards

FISMA

Mandates that federal agencies develop, document, and implement an information security program to protect their data.

63
New cards

GIRSA

Designed to provide a legal framework for the protection of government information on the Internet.

64
New cards

Regulatory Frameworks & Compliance (Top-Down in Importance)

1. Regulatory Frameworks (e.g., PCIDSS)

2. Policies (e.g., Encryption Policy)

3. Standards (e.g., Encryption Standards like AES or RSA)

4. Procedures, Practices, & Guidelines (e.g., Data Encryption Procedures, Practices, & Guidelines)

65
New cards

Steps to Create & Implement a Security Policy

1. Risk Assessment

2. Learn from Standard Guidelines

3. Include Senior Management & Key Staff

4. Define Clear Penalties and Enforce Them

5. Publish the Policy

6. Ensure All Employees Read, Sign, and Understand the Policy

7. Deploy Tools to Enforce the Policy

8. Train Employees on the Policy

9. Regularly Review and Update the Policy

66
New cards

Enterprise Information Security Policy (EISP)

High-level policy establishing the organization's overall security strategy.

67
New cards

Issue-Specific Security Policy (ISSP)

Focuses on specific areas of security, such as email or internet usage.

68
New cards

System-Specific Security Policy (SSSP)

Details the security requirements for individual systems or devices.

69
New cards

Promiscuous Policy

No restrictions on internet or remote access. Everything is allowed.

70
New cards

Permissive Policy

Starts with open access but blocks known dangerous services or threats.

71
New cards

Paranoid Policy

Extremely restrictive, allowing little or no internet access.

72
New cards

Prudent Policy

Balances security with functionality, blocking all but essential services.

73
New cards

Steps to Implement Security Awareness Training

1. Explain Benefits to Upper Management

2. Perform Gap Assessment

3. Schedule Regular Training Sessions

4. Review Training Performance Regularly

5. Simulate Phishing Attacks

6. Re-train Employees Who Fail

7. Implement Policy and Training Process

74
New cards

IT Asset Management (ITAM)

Involves maintaining a log of all IT infrastructure assets, which include hardware, software, licenses, and organizational information. It ensures assets are properly tracked, compliant, and secured.

75
New cards

Physical/Hardware Asset Management

Manages IT hardware, physical inventory, and networking products.

76
New cards

Software Asset Management

Oversees software installations and policies.

77
New cards

Network Asset Management

Manages network devices, such as routers and firewalls.

78
New cards

Digital Asset Management

Manages digital data, including images, videos, and documents.

79
New cards

Mobile Device Management

Oversees employee mobile devices connected to the network.

80
New cards

Cloud Asset Management

Manages security and functionality of cloud services.

81
New cards

Separation of Duties (SoD)

This principle helps mitigate risk by dividing tasks among different individuals to avoid conflicts of interest and reduce the likelihood of malicious activities or security breaches. Some regulations, like GDPR, emphasize the importance of clearly defined roles and responsibilities to enhance security.

82
New cards

Need-to-Know

Under this principle, access to information is restricted to only what is necessary to perform specific tasks, ensuring that sensitive data remains secure.

83
New cards

Principle of Least Privilege (POLP)

Extends the need-to-know principle by granting users only the minimum access needed to perform their job. This enhances security, system stability, and protects the organization from potential internal threats.

84
New cards

DAC (Discretionary Access Control)

Allows users to control access to their own data.

85
New cards

MAC (Mandatory Access Control)

A stricter model where access is controlled by the system based on policies set by an administrator.

86
New cards

RBAC (Role-Based Access Control)

Grants access based on the roles users hold within the organization.

87
New cards

ABAC (Attribute-Based Access Control)

A dynamic model where access is based on user attributes, environment, or resource attributes.

88
New cards

Logical Implementation of DAC, MAC, RBAC

Logical implementations are carried out using Access Control Lists (ACLs), group policies, passwords, and account restrictions.

89
New cards

Logical Implementation of ABAC

Implemented using a policy-based approach, where multiple attributes (role, time, resource, etc.) define access. It allows for fine-grained access control with tools like XACML (Extensible Access Control Markup Language) which enables defining policies to handle access requests.

90
New cards

Keycloak

An open-source identity and access management system (IAM) that provides authentication, user management, and fine-grained authorization based on user attributes.

91
New cards

Bell-LaPadula Model

Focuses on confidentiality:

- No read-up (users cannot read data above their security level)

- No write-down (users cannot write data to lower security levels)

92
New cards

Biba Model

Focuses on integrity:

- No read-down (users cannot read data below their integrity level)

- No write-up (users cannot write data to higher integrity levels)

93
New cards

Network Segmentation

Involves dividing a network into smaller sub-networks or segments, each isolated from others, which helps improve security by limiting access to critical resources.

94
New cards

Best Practices for Network Segmentation

- Least Privilege

Limit access to data based on specific roles to strengthen security.

- Limit Third-Party Access

Restrict remote access from third-party vendors to minimize vulnerabilities.

- Audit & Monitor

Regularly audit and monitor network activity to identify and fix gaps in security.

- Design for Ease of Access

Ensure legitimate access paths are easier to use than illegitimate ones.

- Segment Similar Resources

Combine similar resources into common segments to streamline security policy application.

- Avoid Over-Segmentation

Too many segments can lead to complexity and operational difficulties.

- Visualize the Network

Understand how data flows through the network to make informed decisions on segmentation.

95
New cards

SSL (Secure Sockets Layer) / TLS (Transport Layer Security)

Cryptographic protocols designed to provide secure communication over the internet.

96
New cards

VPN (Virtual Private Network)

Extends a private network across a public network, allowing secure data transmission.

97
New cards

HTTPS

A secure version of HTTP, it uses TLS/SSL to encrypt communication between a web server and browser.

98
New cards

Firewalls

Enforce policies for incoming and outgoing traffic to protect the network.

99
New cards

IDS (Intrusion Detection System)

Monitors for suspicious activity and potential intrusions.

100
New cards

IPS (Intrusion Prevention System)

Detects and prevents intrusions in real-time.