Garden State Cyber
Review sheet – Quiz 1
0.1.1 - Ethics
Review the ethics code of conduct that was signed by you and your parents
A copy can be found in Google Classroom
What, when and where does the agreement cover?
1.1.1 - CIA Triad
What does each letter in CIA triad stand for and be able to give examples
Confidentiality
Availability
Integrity
What are the 3 stages of data?
Data in Transit, Data at Rest, and Data in Use.
What is the model of cybersecurity
Protection =Prevention + (Detection + Response)
1.1.2 & 1.1.3 - Authentication
Authentication
Something you know - name/ ss/ password
Something you have- phone /number
Something you are/
Database
Password attacks
Steal
Guess
How to make a password secure? - long and easy to remember
Brute Force Attack- trying multiple passwords for one account
Dictionary Attack - using word is ing a dictionary to guess the password
Password Spraying- using the same password for multiple accounts
Credential Surfing - using your credential
Breach - unauthorized access to computer data, applications, networks or devices
1.1.4 – Password Hashing
What you know:
Single Sign-On (SSO)
Passphrase
Hashing
One-way encryption
MD5 and SHA1
Rainbow Table
Salt
Hash Collision
Pass the Hash Attack
1.1.5 – Methods of Authentication
What you have:
SmartCards
Proximity Readers
Certificates
One-time password
Token
What you are:
Biometrics
Two Factor Authentication
Stopping Password Attacks
Strong Password
Lockout after multiple attempts
Multi-Factor/Two-Factor Authentication
Biggest Security Flaw of any Organization is?
Humans
Garden State Cyber
Unit 2 - Human Factors
Review
2.1.1 Social Engineering
7 steps in Hacking (don’t need to memorize)
Recon/Footprint
Scanning/Probing
Gaining Access
Escalating Privileges
Exploiting
Covering Tracks
Installing Back Door
Define: Social Engineering - To get an authorized user to give information
or access to an unauthorized person
Which of the 7 steps of hacking use social engineering?
Why is Social Engineering so successful? Human are sloppy,Houman like to avoid confrontation, humans want to be helpful
Techniques of Social Engineering (no need to memorize) and how to protect against them:
Piggybacking 🡪 security guards/gates/turnstiles
Shoulder Surfing 🡪 shield the screen or keypad
Dumpster Diving🡪 shred discarded documents
Scareware 🡪 use malware scanner
Baiting
Info written in workspace
Pretexting - all types
Phishing - all types
Last 4 = User Security Awareness
and Policies
2.2.1 Phishing
Define:
Phishing - is the use of bogus emails and websites to trick you into
supplying confidential or personal information.
Spear Phishing - is an email scam targeted towards a specific
individual, organization or business.
Whaling - describes an email scam targeted to high-value individuals
Business Email Compromise
Smishing - is text messages used for phishing
Vishing - is phone calls or voice messages for phishing
Familiar with Nigerian Prince Email
How to spot phishing emails?- different URL than what the link says and different email than what the sender claims to be
2.2.2 OSINT- Open Source Intelligence Tools
What is OSINT? A public and free website that is legal that can give information
Give examples of OSINT and not OSINT
✅ = Google search, Spokeo, Zillow…
❌= Google classroom, locked case files
2.2.4 Mitigating the Human Risk
Define: Mitigate - to make it less severe and painful.
Policies vs Procedures
A policy is a guiding principle used to set direction in an
organization.
- A procedure is a series of steps to be followed to implement a
policy.
Policy ->Procedure -> User training = Mitigation
Typical computer policies - Poor password selection
Installing unauthorized hardware. Example: adding a wireless access
point in the organization’s network to boost your wifi signal.
Installing unauthorized software may result in a backdoor
Key Terms:
Applications -third party programs installed by user to provide additional functions.
Backup - a process that copies all your files, data and information to effectively create two versions – one on your original devices and one backup.
CVE - Common Vulnerabilities and Exposures
Exploit - specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.
Mitigate - minimize the risk; lessening the force or intensity of something unpleasant.
Patch - an update to close a vulnerability
System Hardening- is the process of limiting potential weaknesses that make systems vulnerable to cyber attacks.
Redundancy - is known as having several copies
System image - a backup that includes the operating system and configuration settings.
Vulnerability - A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
Vulnerability scanner - Automated tool to connect to a system and identify known vulnerabilities
Things to know:
What are 5 actions of system hardening?
Updates
Windows Defender Security Center
UAC settings
Local security policies
Disable unnecessary services
What is the most important thing you can do to secure your system?
updated security/IOS
4 types of updates - patch, hotfix, critical, security
Update / Patch = a tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.
Hotfix = patch for a very specific issue - not released through automatic updates
Critical = fix for a bug that is affecting OS functionality
Security = fixes a vulnerability in the OS code to stop exploits.
Windows Security Center tools
Firewall & Network Protection
Virus and Threat Protection
User Account Control
App and Browser Control
Top 2 sources of vulnerability?
Operating system and user.
Tool which prompts you to confirm a system update?
UCA User Access Control
Password Policy - what does each of these mean?
Length = how many characters
Complexity = what characters are used
Age = when it needs to be reset
History = no reuse
Account Lockout Policy
Threshold
how many invalid passwords a user can attempt before locking out the account.
Duration
the number of minutes that a locked-out account remains locked out before automatically becoming unlocked.
Reset counter time
of minutes that must elapse from the time a user fails to log on before the failed login attempt counter is reset to 0.
What is the 3-2-1 rule of backups?
3 copies of the data.
2 copies stored on different devices. One device is the original system, and the other device can be an external hard-drive, a network drive or even a USB drive.
1 copy offsite or in the cloud.
What is the Least Privilege Principle of cybersecurity?
best practice is to provide each user with the minimum system access needed to perform their necessary tasks.
Two actions to lessen risk from administrative access?
strictly limit how many users are in the Administrators Group. AND they should log on as a regular user, then elevate privileges when needed to perform an administrative function.
What is the difference between a backup and synching with Google Drive or Microsoft OneDrive?
Syncing services such as Google Drive or Microsoft One Drive are not backups because if you delete a file from the local system then that file is also deleted in the cloud. A backup is a static snapshot of data.
Cryptography – scrambling data so that it looks like babble to anyone except those who know the trick to decoding it
Algorithm (aka Cipher) – a precise set of instructions that tells programs how to scramble and unscramble data
Plaintext – decrypted or unencrypted data
Ciphertext – data that has been encrypted
Cryptanalysis – attempting to break a cryptographic system and return the encrypted message to plaintext
Substitution - replacement of a character with a different character
Example: Monoalphabetic ciphers - the same letter is used as a substitute every time. Ex: Z is used for A for the entire ciphe
Transposition - changing the order of items
Example: Scytale cipher - Spartans wrapped a ribbon around a cylinder and writing the message across. When unwrapped, the letters would look like garbled text. It was deciphered by using a cylinder of the exact same diameter of the original.
Caesar Cipher (c. 100 BC)
aka shift cipher
Caesar’s cipher uses an algorithm and a key:
algorithm = you offset the alphabet either to the right (forward) or to the left (backward)
key = how many letters the offset should be
Vigenere Cipher / Polyalphabetic Cipher - substitution based on multiple alphabets, using a system to switch between them.
Frequency Analysis - This is where we use knowledge about the frequency of letters and groups of letters used in a language and then look for this pattern in the ciphertext.
One-Time Pad - Enigma - Definition: an encryption method in which the pre-shared key is used only once. Capturing or stealing the key is useless since it will not be used again to encrypt.