Cybersecurity: Malware and Social Engineering
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of the least privilege principle?

  • To grant users all possible permissions
  • To monitor user activity during working hours
  • To restrict users to only the necessary permissions (correct)
  • To audit user permissions randomly
  • What is the primary purpose of onboarding?

  • To remove user permissions
  • To assign permissions to new users (correct)
  • To disable inactive accounts
  • To monitor user activity
  • What is the primary purpose of recertification?

  • To monitor user activity
  • To examine and verify user permissions (correct)
  • To grant users new permissions
  • To disable inactive accounts
  • What is the primary purpose of a standard naming convention?

    <p>To ensure consistent naming of servers, emails, etc.</p> Signup and view all the answers

    What is the primary purpose of time-of-day restrictions?

    <p>To specify when users can log on to a computer</p> Signup and view all the answers

    What type of account has limited access to a computer or network?

    <p>Guest account</p> Signup and view all the answers

    What is the primary purpose of permission auditing and review?

    <p>To examine and verify user permissions</p> Signup and view all the answers

    What is the primary purpose of account maintenance?

    <p>To run scripts to list and disable inactive users</p> Signup and view all the answers

    What type of account is used by a service or application?

    <p>Service account</p> Signup and view all the answers

    What is the primary purpose of group-based access control?

    <p>To put user accounts into security groups and assign privileges</p> Signup and view all the answers

    Study Notes

    Malware and Backdoors

    • Many types of malware create backdoors, allowing attackers to access systems from remote locations.

    Types of Attacks

    • Social Engineering:
      • Pharming: installing malicious code on a personal computer or server to misdirect users to fraudulent websites without their knowledge or consent.
      • Phishing: emailing users to trick them into revealing personal information or clicking a malicious link.
      • Spam: unwanted email.
      • Spear Phishing: targeted form of phishing that targets specific users or groups.
      • Whaling: form of spear phishing that targets high-level executives.
      • Vishing: using phone calls to trick users into revealing personal information.
      • Tailgating: following an employee through the door without showing credentials.
      • Impersonation: identity theft, often impersonating others like repair technicians to gain access to the server room.
      • Dumpster Diving: searching through trash to gain information from discarded documents.
      • Shoulder Surfing: looking over the shoulder of a user to gain sensitive information.
      • Hoax: false message, often an email telling users there is a virus and encouraging them to delete files or change system configurations.
      • Watering Hole Attack: observing which website a user often uses and infecting it with malware.
    • Wireless Attacks:
      • Replay: capturing data sent between two entities, modifying it, and attempting to impersonate one of the parties by replaying it.
      • Evil Twin: a rogue access point using the same SSID as a legitimate AP.
      • Rogue AP: a WAP placed within a network to sniff data.
      • Jamming: transmitting noise on the same frequency to degrade performance.
      • WPS: allows users to configure a wireless network by pressing buttons or by entering a short PIN, but is vulnerable to brute force attacks.
      • Bluejacking: sending unsolicited messages to nearby Bluetooth devices.
      • Bluesnarfing: unauthorized access to a device via Bluetooth connection.

    Network Address Translation and Switching

    • Network Address Translation (NAT):
      • NAT router acts as the interface between a LAN and the internet using one IP address.
    • Switching:
      • Port security: disabling unused ports and limiting the number of MAC addresses per port.
      • 802.1x server: providing port-based authentication.
      • Layer 2 vs Layer 3: Layer 2 switch routes traffic based on MAC within the same network, while Layer 3 switch routes traffic based on IP between two different networks.
      • Loop prevention: using STP or Rapid STP to prevent switching loops.
      • Flood guard: monitoring traffic rate and percentage of bandwidth occupied by broadcast, multicast, and unicast traffic to detect and block flooding attacks.

    Proxy and Identity and Access Management

    • Proxy:
      • Proxy Server: acts as an Internet gateway, firewall, and internet caching server for a private network.
      • Forward proxy: forwards requests for services from clients and provides caching to improve performance and reduce internet bandwidth usage.
      • Reverse proxy: receives requests on behalf of clients and hides internal servers.
    • Access Control Models:
      • Mandatory Access Control (MAC): uses security labels to determine access.
      • Discretionary Access Control (DAC): specifies that every object has an owner and the owner has full, explicit control of the object.
      • Attribute-Based Access Control (ABAC): uses attributes defined in policies to grant access to resources.
      • Role-Based Access Control (RBAC): creates a role for users and assigns access to the role instead of users.
      • Rule-Based Access Control: based on a set of approved instructions such as an ACL.

    Account Management

    • Account types:
      • User accounts: for regular users.
      • Shared and generic accounts: should not be used.
      • Guest accounts: limited access to computer or network.
      • Service accounts: used by the service or application and not an end user.
      • Privileged accounts: has additional rights and privileges beyond a regular user.
    • General concepts:
      • Least privilege: technical control where users or processes are granted only those rights and permissions needed to perform their assigned tasks or functions.
      • Onboarding/Offboarding: processes for adding and removing users.
      • Permission auditing and review: reviewing and updating user permissions.
      • Usage auditing and review: reviewing user activity.
      • Time-of-day restrictions: specifies when users can log on to a computer.
      • Recertification: process of examining a user's permissions and determining if they still need access to what was previously granted.
      • Standard naming convention: for servers, emails, etc.
      • Account maintenance: running scripts to list users inactive for more than 30 days and disable them.
      • Group-based access control: putting user accounts into security groups and assigning privileges to the groups.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers types of malware, including backdoors, and social engineering attacks such as phishing, pharming, and spimming. Test your knowledge on these cybersecurity threats.

    More Like This

    Use Quizgecko on...
    Browser
    Browser