Podcast
Questions and Answers
What characterizes an armored virus?
What characterizes an armored virus?
- It alters the host code to insert itself.
- It solely generates unsolicited advertisements.
- It confuses antivirus systems to avoid detection. (correct)
- It operates primarily over web applications.
What is the primary objective of an advanced persistent threat (APT)?
What is the primary objective of an advanced persistent threat (APT)?
- To gain and maintain unauthorized access to a network. (correct)
- To inject harmful code into an application.
- To overload a server with traffic.
- To fetch large files for data analytics.
Which action best describes active reconnaissance?
Which action best describes active reconnaissance?
- Scanning a system's open ports using a tool. (correct)
- Tampering with data in transit.
- Injecting malware into a working application.
- Spoofing an IP address to bypass security.
In the context of network security, what does ARP spoofing aim to achieve?
In the context of network security, what does ARP spoofing aim to achieve?
What technique is primarily used in application-level DoS attacks?
What technique is primarily used in application-level DoS attacks?
What unintended consequence does adversarial artificial intelligence (AI) create?
What unintended consequence does adversarial artificial intelligence (AI) create?
What action is involved in AP MAC spoofing?
What action is involved in AP MAC spoofing?
What is typically a defining feature of adware?
What is typically a defining feature of adware?
What is a key characteristic of asymmetric database encryption?
What is a key characteristic of asymmetric database encryption?
Which type of log specifically records events from applications installed on a system?
Which type of log specifically records events from applications installed on a system?
What defines a backdoor Trojan?
What defines a backdoor Trojan?
What is the purpose of a botnet?
What is the purpose of a botnet?
Which attack method continuously tries every possible password combination?
Which attack method continuously tries every possible password combination?
Which of the following describes bluesmacking?
Which of the following describes bluesmacking?
What is a common vulnerability caused by coding errors that can allow attackers to exploit systems?
What is a common vulnerability caused by coding errors that can allow attackers to exploit systems?
What is known as the act of sending unsolicited messages over Bluetooth to devices?
What is known as the act of sending unsolicited messages over Bluetooth to devices?
What term is given to individuals who resort to malicious activities using their computing skills?
What term is given to individuals who resort to malicious activities using their computing skills?
What is the purpose of authentication logs?
What is the purpose of authentication logs?
What does Crossover Error Rate (CER) represent?
What does Crossover Error Rate (CER) represent?
How does Centralized Authorization benefit an organization?
How does Centralized Authorization benefit an organization?
What is the primary purpose of the Computer Fraud and Abuse Act?
What is the primary purpose of the Computer Fraud and Abuse Act?
Capability Maturity Model Integration (CMMI) is mainly used for what purpose?
Capability Maturity Model Integration (CMMI) is mainly used for what purpose?
Which role is primarily responsible for the daily management and oversight of data in an organization?
Which role is primarily responsible for the daily management and oversight of data in an organization?
What is the role of Compensating Controls?
What is the role of Compensating Controls?
What is the purpose of data encryption?
What is the purpose of data encryption?
A Clean-Agent Suppression System is useful in what scenario?
A Clean-Agent Suppression System is useful in what scenario?
What is characteristic of Combination Locks?
What is characteristic of Combination Locks?
Which of the following best describes data retention?
Which of the following best describes data retention?
Who is responsible for collecting and controlling the processing of data in an organization?
Who is responsible for collecting and controlling the processing of data in an organization?
What types of materials do Concealed Weapon/Contraband Detection Devices typically search for?
What types of materials do Concealed Weapon/Contraband Detection Devices typically search for?
Circuit-Level Gateways operate at which layers of network architecture?
Circuit-Level Gateways operate at which layers of network architecture?
What is data masking used for?
What is data masking used for?
What is the main purpose of Client-to-Site VPNs?
What is the main purpose of Client-to-Site VPNs?
Which term refers to the process of ensuring that data cannot be recovered or used once it's no longer needed?
Which term refers to the process of ensuring that data cannot be recovered or used once it's no longer needed?
What is the main responsibility of a Data Protection Officer (DPO)?
What is the main responsibility of a Data Protection Officer (DPO)?
What is the main purpose of a DHCP starvation attack?
What is the main purpose of a DHCP starvation attack?
Which of the following best describes a Distributed Reflection Denial-of-Service (DRDoS) attack?
Which of the following best describes a Distributed Reflection Denial-of-Service (DRDoS) attack?
What technique is employed in a directory traversal attack?
What technique is employed in a directory traversal attack?
What is the primary objective of a DNS amplification attack?
What is the primary objective of a DNS amplification attack?
Which type of attack involves flooding a user with forged de-authentication packets?
Which type of attack involves flooding a user with forged de-authentication packets?
What is a common characteristic of default passwords in network devices?
What is a common characteristic of default passwords in network devices?
In the context of networking security, what does a Data Modification Attack accomplish?
In the context of networking security, what does a Data Modification Attack accomplish?
What is the fundamental goal of a Denial-of-Service (DoS) attack?
What is the fundamental goal of a Denial-of-Service (DoS) attack?
What activity is involved in dumpster diving as a security risk?
What activity is involved in dumpster diving as a security risk?
Which of the following methods do attackers use in a dictionary attack?
Which of the following methods do attackers use in a dictionary attack?
Flashcards
Armored Virus
Armored Virus
A virus designed to trick antivirus software.
Add-on Virus
Add-on Virus
Virus that adds itself to existing code without changing it.
Application Flaws
Application Flaws
Vulnerabilities in applications that attackers exploit.
Active Attacks
Active Attacks
Signup and view all the flashcards
Active Reconnaissance
Active Reconnaissance
Signup and view all the flashcards
Adversary
Adversary
Signup and view all the flashcards
ARP Spoofing
ARP Spoofing
Signup and view all the flashcards
Advanced Persistent Threats (APTs)
Advanced Persistent Threats (APTs)
Signup and view all the flashcards
Asymmetric Database Encryption
Asymmetric Database Encryption
Signup and view all the flashcards
Attack Signatures
Attack Signatures
Signup and view all the flashcards
Application Event Log
Application Event Log
Signup and view all the flashcards
Application Log Entries
Application Log Entries
Signup and view all the flashcards
Authentication Logs
Authentication Logs
Signup and view all the flashcards
Backdoor Trojans
Backdoor Trojans
Signup and view all the flashcards
Botnet Trojans
Botnet Trojans
Signup and view all the flashcards
Buffer Overflows
Buffer Overflows
Signup and view all the flashcards
Brute-Force Attack
Brute-Force Attack
Signup and view all the flashcards
Crossover Error Rate (CER)
Crossover Error Rate (CER)
Signup and view all the flashcards
Centralized Authorization
Centralized Authorization
Signup and view all the flashcards
Computer Fraud and Abuse Act
Computer Fraud and Abuse Act
Signup and view all the flashcards
CMMI (Capability Maturity Model Integration)
CMMI (Capability Maturity Model Integration)
Signup and view all the flashcards
Change Management Policy
Change Management Policy
Signup and view all the flashcards
Compensating Controls
Compensating Controls
Signup and view all the flashcards
Clean-Agent Suppression System
Clean-Agent Suppression System
Signup and view all the flashcards
Circuit-Based Alarm
Circuit-Based Alarm
Signup and view all the flashcards
Client-to-Site VPN
Client-to-Site VPN
Signup and view all the flashcards
Cyber Threat Intelligence (CTI)
Cyber Threat Intelligence (CTI)
Signup and view all the flashcards
Data Security
Data Security
Signup and view all the flashcards
Data Owner
Data Owner
Signup and view all the flashcards
Data Controller
Data Controller
Signup and view all the flashcards
Data Processor
Data Processor
Signup and view all the flashcards
Data Classification
Data Classification
Signup and view all the flashcards
Data Access Control
Data Access Control
Signup and view all the flashcards
Data Encryption
Data Encryption
Signup and view all the flashcards
DHCP Starvation Attack
DHCP Starvation Attack
Signup and view all the flashcards
DNS Footprinting
DNS Footprinting
Signup and view all the flashcards
De-authentication Attack
De-authentication Attack
Signup and view all the flashcards
DHCP Spoofing Attack
DHCP Spoofing Attack
Signup and view all the flashcards
Denial-of-Service (DoS) Attack
Denial-of-Service (DoS) Attack
Signup and view all the flashcards
Distributed Denial-of-Service (DDoS) Attack
Distributed Denial-of-Service (DDoS) Attack
Signup and view all the flashcards
Directory Traversal Attack
Directory Traversal Attack
Signup and view all the flashcards
DNS Amplification Attack
DNS Amplification Attack
Signup and view all the flashcards
Driver Manipulation
Driver Manipulation
Signup and view all the flashcards
Disassociation Attack
Disassociation Attack
Signup and view all the flashcards
Study Notes
Armored Virus
- Designed to confuse or trick antivirus systems
- Prevents detection of the actual infection source
Add-on Virus
- Appends its code to the host code without modification
- Relocates host code to insert its code
Adware
- Software or program that supports advertisements
- Generates unsolicited ads and pop-ups
Application Flaws
- Vulnerabilities in applications
- Exploited by attackers
- Active Attacks: Tamper with data in transit or disrupt services to bypass or break into secured systems.
Active Reconnaissance
- Direct interactions with the target system
- Tools to detect open ports, accessible hosts, router locations, network mapping, and operating systems/applications
- Responsible for the attack event
Adversary
- Refers to an opponent or hacker
- Responsible for the attack event
ARP Spoofing/Poisoning
- Sending forged entries to the target machine's ARP cache
- Large number of forged entries
Address Resolution Protocol (ARP)
- Maps an IP address to a physical machine address recognized in the local network
Advanced Persistent Threats (APTs)
- Network attack type
- Attacker gains unauthorized access and remains undetected for a long period of time
Adversarial Artificial Intelligence (AI)
- Attack vector involving malicious intent
- Designed by attackers to mislead machine learning models
Application-level DoS Attack
- Attacker exhausts available server resources
- Sending hundreds of resource-intensive requests or retrieving image files
- Requiring expensive database server search operations.
API DDoS Attacks
- DDoS attack saturating an API with traffic from multiple infected computers
- Delays legitimate user API services
AP MAC Spoofing
- Hacker spoofs the MAC address of WLAN client equipment to mask as an authorized client
Android Rooting
- Allows Android users to attain privileged control ("root access") within Android's subsystem
Adaptive Chosen-plaintext Attack
- Attacker makes interactive queries
- Chooses subsequent plaintexts based on previous encryption information
Availability
- Assurance that systems are accessible for authorized users when required
- Responsible for delivering, storing, and processing information
Authentication
- Quality of a communication, document, or data being genuine
Auditing
- Tracking and examining network device activities
Active Assessment
- A type of vulnerability assessment
- Uses network scanners to identify hosts, services, and vulnerabilities
Application Assessment
- Focuses on transactional web applications, traditional client-server applications, and hybrid systems
Automated Assessment
- Security professional uses tools (Nessus, Qualys, GFI LanGuard) to assess vulnerabilities
Asset Management
- Process of monitoring and managing assets (systems, printers, software, hardware)
- Cost-effective manner, helping organizational growth
Application Sandboxing
- Executes untrusted applications in an isolated environment
- Protects the system
Application Patch Management
- Monitors and deploys new or missing patches to maintain application security
Application-level Firewall (WAF) Deployment
- Protects web servers from malicious traffic
Application Security Frame
- Web application security scheme
- Threat modeling, vulnerability discovery, and attack surface identification
- Providing appropriate countermeasures.
Application Whitelisting
- Access control allowing only specific programs to run
Application Blacklisting
- Security practice blocking undesirable programs from running
Application Containers
- Used to run a single service
- Layered file systems built on top of OS container technologies
Anything-as-a-Service (XaaS)
- Cloud-computing and remote-access service offered based on demand
AWS Identity and Access Management (IAM)
- Web service permitting customers secure control
- Over access to AWS services and resources
Access Point (AP)
- Connects wireless devices to a wireless/wired network
Association
- Process of connecting a wireless device to an AP
Antenna
- Device for transmitting and receiving electromagnetic waves at radio frequencies
Advanced Encryption Standard (AES)
- NIST encryption specification
- 128-bit block size, key sizes of 128, 192, and 256 bits for different types
ANT
- Wireless sensor protocol enabling communication between sensors and controllers
Assets
- Different components of OT systems like ICSs
- Including sensors, actuators, servers, workstations, network devices, PLCs
Asymmetric Encryption
- Uses two separate keys for encryption and decryption
Asymmetric-key Algorithms
- Uses two different keys for encryption and decryption
Authenticated Encryption with Associated Data (AEAD)
- Ensures the integrity and authenticity of a message
Asymmetric Database Encryption
- Method improving over symmetric database encryption
- Uses one private key for encryption/decryption, and one public key to encrypt data
Attack Signatures
- Suspicious traffic patterns treated as attack signatures
Application Event Log
- Records information from applications: events, warnings, and errors
Application Log Entries
- All events or actions from application runtime
Authentication Logs
- Records authentication process events: access verification for network resources.
Black Hats
- Individuals with extraordinary computer skills
- Resort to malicious activity, also known as crackers
Backdoor Trojans
- Programs bypassing system authentication (IDS/firewalls)
Botnet Trojans
- Infects multiple computers to create a network of bots for distributed tasks
Botnet
- Collection of compromised computers for a distributed task
Buffer Overflows
- Common software vulnerabilities caused by coding errors
- Allowing attackers access to the target system.
Bash
- Can be used to download and execute malicious files.
Brute-Force Attack
- Tries every possible character combination until the password is broken.
Bluesmacking
- DoS attack overloading Bluetooth devices
Bluejacking
- Sending unsolicited messages to Bluetooth devices like mobile phones and laptops.
Bluesnarfing
- Stealing information from a Bluetooth connection.
BlueSniff
- Bluetooth wardriving utility
Bluebugging
- Remotely accessing and controlling a Bluetooth-enabled device.
BluePrinting
- Collecting information about Bluetooth devices (manufacturer, model, firmware version).
Btlejacking
- Bypassing security mechanisms and listening to information shared by BLE devices
Birthday Attack
- Brute-force attacks against cryptographic hashes, making brute-forcing easier
Birthday Paradox
- Probability that two or more people in a group of 23 share the same birthday is greater than 0.5.
Biometrics
- Security technology using individual physical attributes (fingerprint, iris, face, voice, and behavior) for verification.
Business Partner Policy
- Defines agreements, guidelines, and responsibilities for business partners.
Bollards
- Used to control vehicular and pedestrian traffic
Bastion Host
- Computer system designed to protect network resources from attacks.
Behavior-Based IDS
- Detects intrusion by observing deviations from normal system or user behavior.
Blue Teaming
- Security assessment of information security or products.
Black-Box Testing
- Simulates real-world attacks, by mapping the network and enumerating services, shared files, and OS discreetly.
Bug Bounty Program
- Challenge for security professionals to find bugs and report security vulnerabilities in organizations.
Bandwidth
- Amount of information that can be transmitted on a connection
BSSID
- Media access control (MAC) address of an access point (AP) or base station.
BYOD
- Policy allowing employees to bring their personal devices to the workplace.
Bluetooth Low Energy (BLE)
- Wireless personal area network technology for various sectors (healthcare, security, entertainment, and fitness).
Basic Process Control System (BPCS)
- Responsible for process control and monitoring in industrial infrastructures.
BACnet
- Data communication protocol for building automation and control networks
Block Cipher
- Deterministic algorithms on blocks of fixed size with a symmetric key.
Blockchain
- Type of distributed ledger technology used to securely record and store transaction history in blocks.
Business Critical Data
- Data vital for business operations
Bucketing
- Generalizing a field based on values or ranges in data.
Best Evidence Rule
- Court allows original evidence of a document, photograph, or recording instead of copies.
Bandwidth Monitors
- Tools for evaluating available bandwidth on a local system.
Bit-Stream Imaging
- Cloned copy of an entire drive to allow forensic investigators to retrieve deleted files or folders from suspect computer drives.
Business Continuity
- Processes and activities ensuring operational continuity regardless of threats
- Associated with business functions irrespective of possible outages.
Business Continuity Management (BCM)
- Process ensuring business operations continuity during disruptions
Business Recovery
- Plan, arrangements, and procedures for restoring operations after a disaster
Business Impact Analysis (BIA)
- Assessing potential effects of disruptions to critical business operations from disasters.
Business Continuity Plan (BCP)
- Comprehensive document ensuring resilience against threats or disruptions
- Enables continued operations under abnormal conditions.
Cyber Terrorists
- Individuals motivated by beliefs to disrupt computer networks
Criminal Syndicates
- Involved in planned criminal activities, including sophisticated cyberattacks.
Crypter
- Protects malware from reverse engineering.
Compromised Legitimate Websites
- Host embedded malware that affects unsuspecting visitors
Command Shell Trojans
- Provide remote control of a victim's command shell.
Cluster Virus
- Infect files without file or data modification
Companion Virus/Camouflage Virus
- Store themselves with the same filename as the target program
Computer Worms
- Standalone malicious programs that independently replicate and spread
Cryptomining
- Uses victim's assets/financial data for digital mining of cryptocurrencies (e.g., Bitcoin)
Close-in Attacks
- Attackers perform acts (gather, modify, disrupt) in close proximity to the target system or network.
Clearing Tracks
- Activities of an attacker to conceal malicious acts within the network.
Cyber Kill Chain Methodology
- Component of intelligence-driven defense for malicious intrusion activity identification and prevention.
Card Cloning
- Creating a duplicate of a credit card or access card by copying information.
Cross-Site Scripting (XSS or CSS)
- Exploits website vulnerabilities to inject client-side scripts
Command Injection
- Attackers exploit vulnerabilities by injecting malicious commands into applications to execute arbitrary commands
Cross-Site Request Forgery (CSRF)
- Exploits vulnerabilities allowing an attacker to force a user's browser to perform malicious requests without their intention.
Consensus
- People usually like or do things others like or do.
Credential Harvesting
- Collecting credentials through phishing, password dumping tools, and MITM attacks.
Cryptanalysis Attack
- Applies the same procedure as a replay attack, along with reverse engineering of protocol, to capture original signals.
Cloud Hopper Attack
- Triggered at managed service providers (MSPs) and their users
Cloud Cryptojacking
- Unauthorized use of victim's computer for digital currency mining through the cloud.
Cloudborne
- Vulnerability residing in a bare-metal cloud server, implanting malicious backdoors into the firmware
Ciphertext-only Attack
- Attacker accesses the ciphertext to recover the encryption key.
Chosen-plaintext Attack
- Attacker defines plaintext, feeds it to the cipher, and analyzes resulting ciphertext to decrypt.
Chosen-key Attack
- Attacker breaks an n-bit key cipher into operations for decryption.
Confidentiality
- Access to information is restricted to authorized parties only.
Continual/Adaptive Security Strategy
- Continuous actions (prediction, prevention, detection, and response) to ensure comprehensive network defense.
Crossover Error Rate (CER)
- False rejection rate and false acceptance rate when sensitivity in systems is adjusted accordingly.
Centralized Authorization
- Maintains a single database for authorizing network resources or applications.
Computer Fraud and Abuse Act
- States that unauthorized access and excessive access to protected computer systems for information theft is illegal.
Capability Maturity Model Integration (CMMI)
- Process model guiding organizations to promote behaviors that improve performance.
Change Management Policy
- Helps minimize service disruptions while implementing changes
- By following standard change procedures, within an organization
Compensating Controls
- Used when intended controls fail or are not applicable.
Clean-Agent Suppression System
- Inert gas or chemicals to control fires in the initial growth stage.
Combination Locks
- Combination of numbers and/or letters needed to open.
Concealed Weapon/Contraband Detection Devices
- Materials prohibited from entering the controlled environment (e.g., explosives, bombs, weapons)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts in network security, including advanced persistent threats, reconnaissance techniques, and the characteristics of various online threats. This quiz covers essential topics that are crucial for understanding modern cybersecurity challenges.