M1 - Cybersecurity Threats and Attacks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What type of attack involves creating a fake identity or scenario to elicit urgent responses?

  • Pretexting (correct)
  • Vishing
  • Phishing
  • Spear Phishing

What is the primary risk associated with foreign-sourced attacks?

  • Physical threats to devices
  • Malware on personal computers
  • Loss of encryption
  • Surveillance using products sold by governments (correct)

Which phase of a cyberattack involves gaining higher-level access?

  • Covering Tracks
  • Gaining Access
  • Reconnaissance
  • Escalation of Privileges (correct)

Which attack involves the use of telephony systems with spoofed caller IDs?

<p>Vishing (B)</p> Signup and view all the answers

What is a primary concern with cloud computing in terms of data security?

<p>Compliance violations (C)</p> Signup and view all the answers

Which of the following best describes 'watering hole attacks'?

<p>Identifying and exploiting weaknesses in frequently visited websites (A)</p> Signup and view all the answers

Which of these is a methodology used for threat modeling that includes risk analysis?

<p>PASTA (A)</p> Signup and view all the answers

What is the impact of improperly managed Internet of Things (IoT) devices?

<p>Device mismanagement and increased vulnerabilities (B)</p> Signup and view all the answers

Which of the following refers to an attack that entails reworking network devices without authorization?

<p>Tampering (B)</p> Signup and view all the answers

What is an example of social engineering that involves manipulating trust through electronic communications?

<p>Spear phishing (D)</p> Signup and view all the answers

What technique does an attacker use in a denial of service attack?

<p>Congesting the system with large volumes of traffic (D)</p> Signup and view all the answers

Which type of attack uses an intermediary to intercept communications?

<p>Man-in-the-Middle attack (A)</p> Signup and view all the answers

What is the primary goal of an SQL injection attack?

<p>To gain unauthorized access to a web server (D)</p> Signup and view all the answers

Which of the following is NOT a characteristic of social engineering attacks?

<p>Using technical vulnerabilities in software (D)</p> Signup and view all the answers

In a reverse shell attack, what is the attacker's primary strategy?

<p>Initiating communication from inside the target's network (D)</p> Signup and view all the answers

What type of malware is characterized by mutating to avoid detection?

<p>Polymorphic virus (D)</p> Signup and view all the answers

Which attack method involves taking advantage of a system performing operations out of order?

<p>Race condition (C)</p> Signup and view all the answers

What is an example of a network-based attack?

<p>Denial of Service (DoS) (B)</p> Signup and view all the answers

What is spoofing primarily concerned with?

<p>Creating false identities and impersonating others (B)</p> Signup and view all the answers

Which of the following is a common internal threat agent?

<p>Insiders (B)</p> Signup and view all the answers

Flashcards

Network-Based Attacks

A type of attack that uses the infrastructure of a network to disrupt operations.

Covert Channels

A covert channel uses data transmission methods that were not originally intended for such, often disguised to appear as legitimate network traffic.

Buffer Overflows

An overflow in a program's buffer, where the attacker inputs more data than intended, leading to potential code injection.

Denial of Service (DoS)

Flooding a system's network with traffic, congesting it and making it unresponsive to service requests.

Signup and view all the flashcards

Replay Attacks

A cybercriminal intercepts and replays a captured communication at a later time, impersonating a legitimate user.

Signup and view all the flashcards

Port Scanning

Scanning for open ports on a network, often targeting TCP (port 80) for HTTP traffic.

Signup and view all the flashcards

Reverse Shell Attacks

Starting communication behind a firewall, allowing the attacker to bypass it.

Signup and view all the flashcards

Return-Oriented Attacks

Taking parts of legitimate code and using them in a sequence to perform unintended actions.

Signup and view all the flashcards

Spoofing

Impersonating someone by using a fake IP address, domain, or email.

Signup and view all the flashcards

SQL Injection

Exploiting vulnerabilities in web applications to gain unauthorized access to a web server by injecting malicious SQL code.

Signup and view all the flashcards

Rogue Mobile App

A type of malware that appears legitimate but secretly performs malicious actions.

Signup and view all the flashcards

Phishing

A social engineering attack that uses authentic-looking emails to trick users into revealing personal information or visiting fake websites.

Signup and view all the flashcards

Spear Phishing

A specialized type of phishing attack targeting specific employees.

Signup and view all the flashcards

Piggybacking

A physical security attack where an unauthorized person follows someone into a restricted area.

Signup and view all the flashcards

Tampering

A security attack where an attacker tampers with physical infrastructure, such as cabling or adding unauthorized devices.

Signup and view all the flashcards

Embedded Software Code

An attack involving malicious code embedded within software or firmware sold to a company.

Signup and view all the flashcards

Pharming

A cybersecurity attack involving manipulating a victim's computer to direct them to a fake website, often to steal personal information.

Signup and view all the flashcards

Reconnaissance

The first stage of a cyberattack, where attackers gather information about their target.

Signup and view all the flashcards

PASTA

A threat modeling methodology that involves breaking down a system into smaller components to identify vulnerabilities.

Signup and view all the flashcards

VAST

A threat modeling methodology that uses a visual approach to identify and analyze potential threats in a system.

Signup and view all the flashcards

Study Notes

Cybersecurity Threats and Attacks

  • Cybersecurity protects an organization's IT infrastructure and data from malicious actors through technology, internal controls, and best practices.

Threat Agents

  • Attacker/Hacker: Individuals seeking unauthorized access.
  • Adversary: Motivated to attack due to conflict or incentive.
  • Government/State-Sponsored: Funded by nation-states.
  • Hacktivist: Driven by social or political causes.
  • Insider: Someone with authorized access to systems.
  • External Threats: Attacks originating outside the organization.

Cyberattack Types

  • Network-Based Attacks: Exploit network infrastructure.
    • Backdoors/Trapdoors: Secret access points.
    • Covert Channels: Non-intended data transmission methods.
    • Buffer Overflows: Injecting malicious code by exceeding buffer capacity.
    • Denial-of-Service (DoS): Overwhelm a system with traffic.
    • Distributed Denial-of-Service (DDoS): DoS attacks from multiple sources.
    • Man-in-the-Middle (MITM): Attacker intercepts communication.
    • Replay Attacks: Attacker replays intercepted communications.
    • Port Scanning: Identify open ports.
    • Reverse Shell Attacks: Bypass firewalls.
    • Return-Oriented Attacks: Combine legitimate code sequences.
    • Spoofing: Impersonation (e.g., IP, MAC, DNS, hyperlink).
  • Application-Based Attacks: Target application vulnerabilities.
    • SQL Injection: Inject malicious SQL code into applications.
    • Cross-Site Scripting (XSS): Inject malicious scripts into websites.
    • Race Condition: Exploit timing vulnerabilities.
    • Mobile Code (Malicious): Self-replicating from computer to computer.
  • Host-Based Attacks: Target a single host.
    • Brute-Force Attacks: Systematically try passwords.
    • Keystroke Logging: Record keystrokes.
    • Malware: Unauthorized software (viruses, worms, Trojans, adware, spyware).
    • Rogue Mobile Apps: Malicious applications disguised as legitimate ones.
  • Social Engineering Attacks: Exploit human psychology.
    • Phishing: Deceptive emails/messages.
    • Spear Phishing: Targeted phishing attacks.
    • Business Email Compromise (BEC): Targets executives.
    • Pretexting: Create a fake scenario.
    • Vishing: Phishing over the phone.
  • Physical (On-Premises) Attacks: Exploit physical access.
    • Piggybacking: Following someone into a restricted area.
    • Tampering: Physically altering equipment.
    • Theft: Unauthorized removal of assets.
  • Supply Chain Attacks: Exploit vulnerabilities in the supply chain.
    • Embedded Software Code: Malicious software within hardware/software.
    • Foreign-Sourced Attacks: Malicious code disguised as legitimate products.
    • Watering Hole Attacks: Target websites used by multiple organizations.

Cyberattack Stages

  • Reconnaissance: Gathering information.
  • Gaining Access: Entering the target system.
  • Privilege Escalation: Increasing access level.
  • Maintaining Access: Staying in the system.
  • Network Exploitation and Exfiltration: Malicious activity.
  • Covering Tracks: Hiding the attack.

Risks in Different Technologies

  • Cloud Computing: Additional exposure, malware, compliance violations, data/control loss, visibility loss, multi-cloud management, intellectual property theft.
  • Mobile Technologies: Malware, lack of updates/encryption, physical threats, unsecured Wi-Fi, location tracking.
  • Internet of Things (IoT): Device mismanagement, spoofing, escalated cyberattacks, expanded footprint, information theft, outdated firmware, malware, network attacks.

Threat Modeling Methodologies

  • PASTA (Process for Attack Simulation and Threat Analysis): Define objectives, scope, decomposition, threat/vulnerability analysis, attack modeling/simulation, and risk analysis.
  • VAST (Visual, Agile, and Simple Threat): Flexible model for scaling threat analysis.
  • STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial-of-Service, Elevation of Privilege): Categorizes various threats.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser