Cybersecurity: CIA Triad and Attack Types

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What aspect of information security ensures timely and reliable access to data for authorized users?

  • Confidentiality
  • Availability (correct)
  • Integrity
  • Maintainability

Which attack type involves a criminal taking small amounts of money that are unlikely to be noticed by individual victims?

  • Salami Attack (correct)
  • DoS Attack
  • Ransomware
  • Phishing

What type of attack floods a targeted network with traffic, rendering it inaccessible to legitimate users?

  • DoS (Denial-of-Service) attack (correct)
  • Salami Attack
  • Malware
  • Phishing

What general term is used for malicious software?

<p>Malware (C)</p> Signup and view all the answers

What is the term for unsolicited bulk email?

<p>SPAM (D)</p> Signup and view all the answers

What is a network of compromised computers used for illegal activities called?

<p>Botnet (D)</p> Signup and view all the answers

What is the term for threatening to release sensitive information if a ransom is not paid?

<p>Extortion (D)</p> Signup and view all the answers

What is the process of converting a password into a string of characters using a hash function called?

<p>Hashing (A)</p> Signup and view all the answers

What adds a random string to each password before hashing?

<p>Salting (A)</p> Signup and view all the answers

What is a cyber-enabled crime that involves the unauthorized release of personal information with the intent to harass called?

<p>Doxing (B)</p> Signup and view all the answers

Flashcards

Confidentiality

Restricting access to sensitive information or data to authorized individuals only.

Integrity

Guarding against improper modification or destruction of information or data.

Availability

Ensuring timely and reliable access to data, information & resources for authorized users.

Salami Attack

A financial cyber attack where small amounts are taken to go unnoticed.

Signup and view all the flashcards

DoS (Denial-of-Service) attack

Attack that makes legitimate users unable to access information systems or network resources.

Signup and view all the flashcards

Malware

A broad term for malicious software, including viruses and spyware.

Signup and view all the flashcards

Grayware

Software that may negatively impact the user in terms of privacy, performance, and efficiency, bundled with downloads.

Signup and view all the flashcards

SPAM

Unsolicited bulk email with financial, political, or sexual incentives.

Signup and view all the flashcards

Extortion

Threatening to release sensitive information unless a ransom is paid.

Signup and view all the flashcards

Doxing

Cyber-enabled crime is the unauthorized release of personal information to harass.

Signup and view all the flashcards

Study Notes

Information/Cybersecurity

  • Confidentiality restricts access to sensitive information or data to authorized individuals only
  • Integrity guards against improper modification or destruction of information or data
  • Availability ensures timely and reliable access to data, information, and resources for authorized users

Attack Rules

  • ISO 27000 covers any attempt to expose, alter, disable, destroy, steal, or gain unauthorized access to an asset
  • CNSS addresses any malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources
  • IETF considers an assault on system security that attempts to evade security services and violate security policy

Specific Attack Types

  • Salami Attack is a financial cyber attack involving small, unnoticed amounts of money from many cases
    • Its effectiveness stems from victims not noticing or reporting the small losses
  • DoS (Denial-of-Service) attack prevents legitimate users from accessing systems by flooding the target with traffic, causing crashes

Malware and Grayware

  • Malware ("Malicious Software") is a broad term for malicious software, including computer viruses and spyware
    • Spyware harvests user information for profit, including selling data or stealing user credentials
  • Grayware negatively impacts user privacy, performance, and efficiency, often bundled with free software
    • Adware aggressively displays ads post-installation
    • Scareware uses false alerts from anti-malware software
    • Rooting Tools attempt to gain root privileges on a user's device
    • Tracking/Spyware tracks activities and collects data without consent
    • Remote Access Tools enable remote administration of a device
      • Droppers install unwanted apps in the background without consent
    • Hijackers change settings to reroute users
  • SPAM is unsolicited bulk email with financial, political, sexual, or ideological incentives
  • Botnets are networks of compromised computers engaging in illegal activities like distributing spam and launching DDoS attacks
  • Social Link Farming involves creating fake online profiles with artificial followers
  • Ransomware involves:
    • Extortion: Threatening to release sensitive information unless a ransom is paid
    • Encryption: Blocking access to critical information until ransom payment
    • Double Extortion: Auctioning victim data on criminal markets

Phishing and IoT Security

  • Phishing asks for money, installs malware, and obtains user credentials
  • Securing IoT Devices:
    • The best solution is to avoid using or block network access entirely
    • Consider strict access control, regular software updates, changing default passwords, using WPA# encryption, and VPN routers

Digital Transformation of Crime

  • Cybercrimes are driven by readily available tools and often require minimal technical skills

Advanced Persistent Threat (APT)

  • APTs employ complex strategies, are well-resourced, and maintain unauthorized network access for extended periods

APTs vs Cybercrime Organizations vs Intelligence Services

  • APTs focus on espionage and strategic data gathering, are state-sponsored, and target governments/corporations with a stealthy, long-term approach
  • Cybercrime Organizations focus on financial gain, operate independently, target direct, oriented targets to make money fast with a direct, money-focused approach
  • Intelligence Services focus on national security and surveillance, are government-affiliated, and target stealthy covert targets (NSA, FSB) with covert and highly advanced techniques

Hack-for-Hire, Data Brokers, and Backdoors

  • Hack-for-hire allows outsourcing risky activities to avoid detection
  • Data Brokers obtain and sell user information
  • Backdoors bypass authentication for unauthorized access and can be found in cryptographic algorithms, OS, software, or hardware
  • Crypto Wars involve government attempts to weaken encryption

NDA Violations and Cookies

  • 70% of software professionals admit they might violate NDAs from previous employers
  • Ethical culture and reporting mechanisms can limit NDA violations
  • Cookies are information stored on user's devices
    • First-party cookies are from the visited website
    • Third-party cookies are from services other than the visited website
    • Supercookies are purposefully difficult to remove

Cryptography

  • Cryptography involves the mathematics of encrypting/decrypting communications
    • Public key (asymmetric) uses key pairs for encryption/decryption
    • Private key (symmetric ) uses the same secret key for all parties
    • Zero-Access Encryption ensures data encryption prevents server operators from accessing unencrypted data

Hashing and Salting

  • Hashing converts a password into a string of characters using a hash function
  • Salting enhances security by adding a random string to each password before hashing

Cryptographic Accelerator

  • Cryptographic Accelerators are hardware components on the motherboard that speed up encryption/decryption

Full-Disk Encryption and SS7

  • Full-disk encryption secures data by encrypting the entire disk, requiring a password upon reset, shutdown, or sleep
  • Signaling System No. 7 (SS7) facilitates voice calls, SMS, and other services on telephone networks

IMSI-Catchers, SIM Swap Attack, and Doxing

  • IMSI-Catchers are fake cell towers that capture International Mobile Subscriber Identity
  • SIM Swap Attacks involve attackers getting a new SIM card linked to the victim's number
  • Doxing is the unauthorized release of personal information to harass, threaten, or cause harm

Sha Zhu Pan and Acoustic Cryptanalysis

  • Sha Zhu Pan is a pig-butchering scam that involves fraudulent dating tactics to trick victims into investing into crypto websites
  • Acoustic Cryptanalysis analyzes sounds from devices like CPUs or keyboards
    • Timing Attacks measure the time for cryptographic operations, remote
    • Power Analysis Attacks measure power consumption, physical access needed
    • Electromagnetic Attacks capture emissions, requires specialized equipment
    • Fault Injection Attacks induce device errors to reveal information

Firewalls and VPNs

  • Firewalls filter network traffic between internal and external networks
  • Device-based VPNs are software programs installed on devices to encrypt internet traffic
  • VPN Routers function similarly to device-based VPNs but encrypt at the router level

Sanctions and Cybersecurity Policies

  • Sanctions are penalties for law violations and can be for cybersecurity policy violations
  • Cybersecurity Policies are normative documents requiring justifications and are communicative documents
  • Normative Documents outline what the organization should do regarding cybersecurity and information security
  • Communicative Documents aim to clearly communicate cybersecurity norms to employees

CISO Duties

  • Oversee cybersecurity policy management by developing strategies, updating policies, participating in design, and developing standards
  • Manage day-to-day operations by leading teams, assigning tasks, coordinating efforts, and making trade-offs
  • Provide cybersecurity education by SETA's development and maintenance
  • Maintain currency and threat awareness by understanding cybersecurity protection mechanisms
  • Maintain relationships with vendors, consultants, and auditors
  • Recovery planning involves developing, disseminating, and enforcing business continuity and disaster recovery plans with simulations
  • Investigate cybersecurity breaches by performing IT forensics

Integration Steps

  • Risk Identification: Using abuse cases to highlight potential security breaches and undesirable actions that could harm the system
  • Risk Assessment: Analyzing identified risks to evaluate severity and likelihood
  • Risk Control Measures: Designing and implementing controls to mitigate identified risks, involving countermeasures for abuse cases
  • Continuous Monitoring: Regularly reviewing and updating risk assessments and controls for new threats

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser