Podcast
Questions and Answers
Which of the following best describes 'modeling a threat' in the context of cyber security?
Which of the following best describes 'modeling a threat' in the context of cyber security?
- Thwarting an attack before it occurs by adding rules to the security policy. (correct)
- Analyzing the financial impact of a potential cyber attack.
- Predicting the exact date and time a cyber attack will occur.
- Quantifying the uncertainty associated with a specific type of cyber attack.
How do 'hackers' and 'crackers' differ in their approach to unauthorized computer intrusions?
How do 'hackers' and 'crackers' differ in their approach to unauthorized computer intrusions?
- Hackers always work in groups, while crackers operate individually.
- Hackers primarily target government systems, while crackers focus on private sector networks.
- Hackers may not intend to cause damage, whereas crackers specifically aim to cause damage. (correct)
- Hackers focus on exploiting financial systems, while crackers target personal data.
Which of the following most accurately defines cyberterrorism?
Which of the following most accurately defines cyberterrorism?
- The use of technology to steal financial information from corporations.
- The act of hacking into government websites to deface them with propaganda.
- Acts in cyberspace intended to create fear, panic, or coercion, often for political or social objectives. (correct)
- Any illegal activity conducted using computers and the internet.
What is the primary goal of 'coordination' as an attack feature in cybersecurity?
What is the primary goal of 'coordination' as an attack feature in cybersecurity?
What distinguishes an 'active attack' from a 'passive attack' in cybersecurity?
What distinguishes an 'active attack' from a 'passive attack' in cybersecurity?
During which stage of a typical cyber attack does privilege escalation occur?
During which stage of a typical cyber attack does privilege escalation occur?
Which of the following activities is characteristic of the 'Reconnaissance' phase of a cyber attack?
Which of the following activities is characteristic of the 'Reconnaissance' phase of a cyber attack?
What is the primary objective of a Denial of Service (DoS) attack?
What is the primary objective of a Denial of Service (DoS) attack?
A malicious intruder conducts a ping sweep to determine which IP addresses are active then queries the ports to determine the type and version of the application and operating system running on the target host. What type of attack is this?
A malicious intruder conducts a ping sweep to determine which IP addresses are active then queries the ports to determine the type and version of the application and operating system running on the target host. What type of attack is this?
In the context of access attacks, what is 'trust exploitation'?
In the context of access attacks, what is 'trust exploitation'?
Which type of access attack involves an attacker positioning themselves between two communicating legitimate entities in order to read or modify data?
Which type of access attack involves an attacker positioning themselves between two communicating legitimate entities in order to read or modify data?
What is the primary consequence of a 'buffer overflow' vulnerability?
What is the primary consequence of a 'buffer overflow' vulnerability?
In the context of Denial of Service (DoS) attacks, what is the main effect of saturating a network with seemingly valid traffic?
In the context of Denial of Service (DoS) attacks, what is the main effect of saturating a network with seemingly valid traffic?
What was the primary method of propagation used in the 2016 Mirai botnet attack?
What was the primary method of propagation used in the 2016 Mirai botnet attack?
What is the core characteristic of SQL injection vulnerabilities?
What is the core characteristic of SQL injection vulnerabilities?
What was the primary goal of the attackers in the WannaCry ransomware attack of 2017?
What was the primary goal of the attackers in the WannaCry ransomware attack of 2017?
What differentiates parasitic malware from other forms of malware?
What differentiates parasitic malware from other forms of malware?
How do viruses and worms differ in their method of operation?
How do viruses and worms differ in their method of operation?
Which of the following best describes the activation mechanism for a logic bomb?
Which of the following best describes the activation mechanism for a logic bomb?
What is the defining characteristic of a 'backdoor' (or trapdoor) in the context of computer security?
What is the defining characteristic of a 'backdoor' (or trapdoor) in the context of computer security?
What action does a computer virus perform when it 'infects' another host program?
What action does a computer virus perform when it 'infects' another host program?
What happens during the 'dormant phase' of a computer virus's lifecycle?
What happens during the 'dormant phase' of a computer virus's lifecycle?
Which of the following describes the 'trigger' component of a virus?
Which of the following describes the 'trigger' component of a virus?
What is the key characteristic of 'Zero-Day Exploits'?
What is the key characteristic of 'Zero-Day Exploits'?
Which of the following reflects the intent of someone performing hacking?
Which of the following reflects the intent of someone performing hacking?
Which of the following is NOT a threat and potential consequence?
Which of the following is NOT a threat and potential consequence?
The process of making decisions based on threat or alert is called?
The process of making decisions based on threat or alert is called?
Unauthorized computer intrusions not intended to cause damage are encompassed by the terms?
Unauthorized computer intrusions not intended to cause damage are encompassed by the terms?
Looking at the title du graphique, Hacking has the highest relative value in which category?
Looking at the title du graphique, Hacking has the highest relative value in which category?
The attack feature versioning consists of:
The attack feature versioning consists of:
Which of the following is the correct prevention for passive attacks?
Which of the following is the correct prevention for passive attacks?
Which of the following stages of a typical attack scenario belongs to Access Attack?
Which of the following stages of a typical attack scenario belongs to Access Attack?
Gaining unauthorized access to sensitive systems is called:
Gaining unauthorized access to sensitive systems is called:
Which of the following is not an access attack:
Which of the following is not an access attack:
A trust exploitation consists of:
A trust exploitation consists of:
An intrusion tool is installed on the compromised system for session redirection is called:
An intrusion tool is installed on the compromised system for session redirection is called:
Looking at the lecture material, which statement is true regarding viruses?
Looking at the lecture material, which statement is true regarding viruses?
The key to virus operation is that:
The key to virus operation is that:
Flashcards
Attacks
Attacks
An abstract concept represented by information that varies depending on the situation, including threat, intrusion and alert.
Hacking
Hacking
Manipulating or modifying technologies without respect to their initial functions.
Cracker (black hacker)
Cracker (black hacker)
Someone who trespasses on computer networks without authorization and with harmful intent.
Cyberterrorism
Cyberterrorism
Signup and view all the flashcards
Attack features : Coordination
Attack features : Coordination
Signup and view all the flashcards
Attack features : Incomplete knowledge
Attack features : Incomplete knowledge
Signup and view all the flashcards
Attack features : Versioning
Attack features : Versioning
Signup and view all the flashcards
Passive attacks
Passive attacks
Signup and view all the flashcards
Active attacks
Active attacks
Signup and view all the flashcards
Reconnaissance Attacks
Reconnaissance Attacks
Signup and view all the flashcards
Access Attacks
Access Attacks
Signup and view all the flashcards
Denial of Service Attacks (DoS)
Denial of Service Attacks (DoS)
Signup and view all the flashcards
Password attack
Password attack
Signup and view all the flashcards
Trust exploitation
Trust exploitation
Signup and view all the flashcards
Port redirection
Port redirection
Signup and view all the flashcards
Man-in-the-middle attack
Man-in-the-middle attack
Signup and view all the flashcards
Buffer overflow
Buffer overflow
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
DDoS (Distributed Denial of Service)
DDoS (Distributed Denial of Service)
Signup and view all the flashcards
SQL Injection
SQL Injection
Signup and view all the flashcards
Ransomware Attacks
Ransomware Attacks
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Logic bomb
Logic bomb
Signup and view all the flashcards
Trojan horse
Trojan horse
Signup and view all the flashcards
Backdoor (trapdoor)
Backdoor (trapdoor)
Signup and view all the flashcards
Computer Virus
Computer Virus
Signup and view all the flashcards
Dormant phase
Dormant phase
Signup and view all the flashcards
Propagation phase
Propagation phase
Signup and view all the flashcards
Triggering phase
Triggering phase
Signup and view all the flashcards
Execution phase
Execution phase
Signup and view all the flashcards
Zero-Day Exploits
Zero-Day Exploits
Signup and view all the flashcards
Study Notes
Attacks
- An attack represents an abstract concept that varies based on the situation.
- Threats involve outcomes and probabilities.
- Intrusions involve elementary actions and composition rules.
- Alerts involve FP probability, FN probability, and alert/attack weight.
Threats and Potential Consequences
- Threats can result in worms/viruses, recon attacks, distributed denial of service, privilege escalation, machine compromise, and social engineering.
- Potential consequences include disruption of business, loss of productivity, loss of privacy, theft of information, legal liability, and damage to reputation and consumer confidence.
Threats and Alerts
- Threats and alerts are used to select the best countermeasures for an attack using a cost-benefit balance.
- They are characterized by an amount of uncertainty.
- Modeling a threat can help prevent attacks by adding rules to the security policy.
- Alerts provide a way to react against intrusions.
Hacking
- Hacking manipulates or modifies technologies without concern for their original functions.
- It should be distinguished from cracking, which is a destructive form of hacking.
Hacker (White Hacker)
- A hacker enjoys learning the details of programming systems.
- A hacker stretches the possibilities of systems.
- A hacker programs enthusiastically.
- A hacker appreciates hack value.
- A hacker is skilled at programming quickly.
- A hacker is an expert at a particular program.
- A hacker may be a malicious or inquisitive meddler.
Cracker (Black Hacker)
- A cracker trespasses onto computer systems and cause harm.
- Hacking includes unauthorized computer intrusions not intended to cause damage.
- Cracking encompass unauthorized computer intrusions intended to cause damage.
Cyberterrorism
- Cyberterrorism involves both acts in cyberspace as well as the use of cyberspace tools to create fear or panic and to intimidate or coerce a government.
- Cyberterrorism may be committed by subnational groups.
- Cyberterrorism may be in the furtherance of political or social causes.
Hacking - Cybercrime - Cyberterrorism
- Hacking can be driven by competition, fame, or correcting bugs
- Cybercrime often aims for financial gain.
- Cyberterrorism aims for political agendas.
Attack Features
- Coordination: Attackers combine multiple attacks or use external resources to make detection and characterization difficult.
- Incomplete Knowledge: Attack events are always characterized by uncertainty.
- Versioning: Attack schemes are kept modulo slight modifications.
Attacks Classification
- Passive Attacks: Provide information about the information system; prevention is the goal here.
- Active Attacks: Modify data stream or create a false stream; prevention, detection, and recovery are all important here.
Typical Attack Scenario
- A typical attack scenario begins with reconnaissance, then port scanning, then enumeration.
- The attacker will then try to gain unauthorized access and attempt privilege escalation.
- The attacker will then try and collect / Steal data, then hide traces and install a backdoor.
- Finally, the attacker may use a denial of service.
- The listed steps can be classified as reconnaissance attacks, access attacks, and DoS attacks.
Stages of a Cyber Attack
- Reconnaissance: Gathering intelligence on the target.
- Exploitation: Exploiting vulnerabilities
- Privilege Escalation: Gaining unauthorized access to sensitive systems.
- Data Exfiltration: Stealing, encrypting, or manipulating data.
- Covering Tracks: Erasing logs and avoiding detection.
Attacks Types
- Reconnaissance Attacks: Discovery and mapping of systems, services, or vulnerabilities; use packet sniffers and port scanners.
- Access Attacks: Exploit vulnerabilities in authentication, FTP, and web services to gain entry to sensitive information; employ dictionary attacks to guess passwords.
- Denial of Service Attacks (DoS): Send large numbers of requests over a network to cause the target device to run suboptimally and become unavailable for legitimate use.
Reconnaissance Attacks: Examples
- Reconnaissance attacks involve information gathering through eavesdropping and packet sniffing.
- Malicious intruders conduct ping sweeps to determine active IP addresses
- Malicious intruders check available services/ports using Nmap port scans.
- Intruders determine application/OS versions.
- Packet sniffers and port scans are used in these attacks.
Reconnaissance Attacks: Internet Queries
- This involves using utilities such as whois to gather information about the target.
Phishing & Social Engineering
- These attack types trick users into revealing credentials.
- In 2016, a hacker impersonated a Google and Facebook vendor to steal $100 million.
- The hacker identified employees responsible for payments and created fake email addresses.
- The hacker sent fraudulent invoices, and the finance teams were tricked into wire transfers to overseas bank accounts.
Access attacks
- Hackers use access attacks to retrieve data, gain access, and escalate access privileges.
- Includes password attacks, brute-force attacks, trojan horse programs, IP spoofing, and packet sniffers.
- A brute-force attack uses a program to run across the network to try and log in to a shared resource.
- Success may allow attackers to create back doors for future use.
Types of Access Attacks
- Password attack
- Trust exploitation
- Port redirection
- Man-in-the-middle attack
- Buffer overflow
Password Attack
- An attacker attempts to guess system passwords.
- A dictionary attack is a common example of a password attack.
- Brute-force attacks, trojan horse programs, and packet sniffers can be used in these attacks.
Trust exploitation
- This involves abusing granted system privileges in an unauthorized way, potentially compromising the target.
Port Redirection
- This uses a compromised system as a jump-off point for attacks against other targets.
- An intrusion tool can be installed on the compromised system for session redirection.
Man-in-the-Middle Attack
- An attacker positions themselves in the middle of communications between two legitimate entities.
- The attacker may then read or modify the data that passes between the two entities.
Buffer Overflow
- This happens when a program writes data beyond the allocated buffer memory.
- It is the consequence of a bug in a C or C++ program.
- Valid data can be overwritten or exploited for the execution of malicious code.
Denial of Service Attacks (DoS)
- This involves the interruption of service to users, devices, or applications.
- This may involve generating large amounts of valid network traffic, saturating the network.
- A DoS attack may occur when a host fails to handle an unexpected condition.
- It may also occur when a network, host, or application is unable to handle an enormous quantity of data.
DDoS (Distributed Denial of Service)
- This involves overloading systems to disrupt services.
- In 2016 Mirai botnet attack took down major websites (Twitter, Netflix, Amazon).
- Computers were infected with malware and then used to launch massive traffic floods at DNS providers.
- Websites relying on these services experienced outages.
SQL Injection
- This is a subset of unverified user input vulnerability that injects malicious code into SQL queries.
- This code is executed when passed on to the SQL server.
- In 2019, an attacker exploited an SQL Injection vulnerability in a government website, leaking millions of citizen records.
- The attacker injected malicious SQL code, bypassing authentication.
Ransomware Attacks
- This involves encrypting data and demanding a ransom.
- The 2017 WannaCry Ransomware Attack affected over 200,000 computers worldwide.
- Attackers exploited an SMB protocol vulnerability in Windows.
- Malware spread automatically across networks.
- Organizations without backups were forced to pay ransom or lose data.
Malware
- Malware are programs exploiting computing system vulnerabilities.
- Malware can be parasitic, requiring a host program, or independent/self-contained.
- Parasitic malware includes viruses, logic bombs, and backdoors.
- Independent forms include worms and bots.
- Software threats either do not replicate and are activated by a trigger, or replicate and propagate themselves.
Malware Terminology
- Virus: Code that inserts itself into a host program and requires the host program to run independently.
- Worm: A program that can run independently and propagate a complete working version of itself onto other hosts on a network.
- Logic Bomb: Program inserted by an intruder that executes on a specific condition (trigger).
- Trojan Horse: Programs that appear to have a useful function, but perform another malicious function without the user's knowledge.
- Backdoor (Trapdoor): Bypasses normal security checks and recognizes special input, legitimately used to debug and test programs.
Computer Virus
- A computer virus is a self-replicating code attached to another program.
- This will infect another (host) program with a copy of itself and then executes secretly when the host program is run.
- A virus propagates and carries a payload.
Virus Operation
- During its lifetime, a typical virus goes through four phases, which are:
- Dormant Phase: The virus is idle, waiting for a trigger event.
- Propagation Phase: The virus places a copy of itself into other programs or system areas on a disk, and may morph to avoid detection.
- Triggering Phase: The virus is activated by a trigger to perform the intended function.
- Execution Phase: The intended function is performed.
- Virus details are specific to the hardware/OS.
Virus Structure
- Major components are the infection mechanism, trigger, and payload.
- The infection mechanism is the code that enables replication.
- The infected program, when invoked, executes the virus code first and then the original program code.
- Prevention blocks initial infection or propagation (with access controls).
Zero-Day Exploits
- This involves attacking unpatched software vulnerabilities.
- The 2010 Stuxnet worm targeted Iranian nuclear facilities.
- The process involved Malware being introduced via infected USB drives.
- Zero-day vulnerabilities in Windows were then exploited.
- The attacker took control of industrial control systems.
- Uranium enrichment processes were sabotaged by altering centrifuge speeds.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.