SENG 411 Cyber Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the primary focuses of defense in cybersecurity?

  • Prevention and threat detection (correct)
  • Increasing attack surfaces and exploiting vulnerabilities
  • Alerting stakeholders about potential vulnerabilities
  • Hacking systems to test their resilience

What distinguishes a threat from a vulnerability in cybersecurity?

  • Threats only arise if vulnerabilities are exploited.
  • A vulnerability refers to a threat that is likely to occur.
  • A vulnerability is an actual attack while a threat can be merely a suggestion.
  • A threat is an actual attack whereas a vulnerability is a potential weakness. (correct)

Which of the following is NOT a basic component of cybersecurity?

  • Encryption (correct)
  • Threat
  • Vulnerability
  • Countermeasure

In the context of cybersecurity, what does a countermeasure aim to do?

<p>Prevent a vulnerability from being exploited (D)</p> Signup and view all the answers

How was cyber warfare recognized as a significant threat in 2011?

<p>The Pentagon classified it as the fifth domain of battle. (B)</p> Signup and view all the answers

What does the principle of confidentiality in information security ensure?

<p>Information is accessible only to authorized users. (A)</p> Signup and view all the answers

Why is integrity important in information security?

<p>It prevents unauthorized modifications to data. (A)</p> Signup and view all the answers

Which of the following is closely related to the availability principle in information security?

<p>Disaster recovery plans. (D)</p> Signup and view all the answers

What does non-repudiation guarantee in the context of information security?

<p>That the sender cannot deny sending a message. (C)</p> Signup and view all the answers

In the context of info assurance, what additional elements are combined with the CIA triad?

<p>Authenticity and non-repudiation. (C)</p> Signup and view all the answers

Which method is primarily used to ensure data integrity?

<p>Hash functions. (B)</p> Signup and view all the answers

To verify the identity of a user, which type of authentication is NOT commonly used?

<p>Something you interact with (mouse). (D)</p> Signup and view all the answers

How is authenticity typically ensured in communications?

<p>By checking identities and using digital signatures. (B)</p> Signup and view all the answers

What is the primary aim of information security?

<p>To ensure the confidentiality, integrity, and availability of information (B)</p> Signup and view all the answers

Which of the following is NOT a component of the hacking methodology discussed?

<p>Distributing malware (A)</p> Signup and view all the answers

What does the term 'APT' refer to in the context of malware threats?

<p>Advanced Persistent Threat (C)</p> Signup and view all the answers

Which type of encryption involves a single key for both encryption and decryption?

<p>Symmetric encryption (D)</p> Signup and view all the answers

Which session hijacking technique involves intercepting communication between the user and the server?

<p>Man-in-the-Middle Attack (D)</p> Signup and view all the answers

What is one of the main purposes of digital forensics in security operations?

<p>To analyze and preserve digital evidence (B)</p> Signup and view all the answers

What is a primary focus of risk management in security governance?

<p>Identifying, assessing, and prioritizing risks (D)</p> Signup and view all the answers

Which of these topics is covered under mobile and cloud security?

<p>Threats and countermeasures (A)</p> Signup and view all the answers

What is the primary focus of ethical hacking?

<p>Test and improve security systems (A)</p> Signup and view all the answers

Which concept is closely associated with the analysis and prevention of social engineering threats?

<p>User training and awareness (A)</p> Signup and view all the answers

What is considered a passive attack?

<p>Intercepting and monitoring network traffic (A)</p> Signup and view all the answers

Which motive is related to disrupting the operational capabilities of a business?

<p>Disrupting business continuity (B)</p> Signup and view all the answers

Which of the following is an active attack?

<p>DNS and ARP poisoning (C)</p> Signup and view all the answers

What characterizes insider attacks?

<p>Trusted individuals exploit privileged access. (B)</p> Signup and view all the answers

Which type of attack involves an attacker being in physical proximity to the target?

<p>Close-in attack (C)</p> Signup and view all the answers

What is the main goal of distribution attacks?

<p>To tamper with hardware or software prior to installation (D)</p> Signup and view all the answers

Which method is typically associated with footprinting?

<p>Gaining information about a target's IP address range (C)</p> Signup and view all the answers

Which technique is commonly used in active attacks?

<p>Spoofing attacks (D)</p> Signup and view all the answers

Which motive involves seeking revenge on an individual or organization?

<p>Taking revenge (C)</p> Signup and view all the answers

What type of attack includes methods like dumpster diving and shoulder surfing?

<p>Close-in attack (C)</p> Signup and view all the answers

What is the primary role of the blue team in cybersecurity?

<p>Defend against attackers and red teams (C)</p> Signup and view all the answers

What is a disadvantage of conducting black box penetration testing?

<p>It can leave parts of the infrastructure untested (D)</p> Signup and view all the answers

What is the purpose of penetration testing tools?

<p>Simulate real-world attack scenarios (B)</p> Signup and view all the answers

What is a significant pro of white box penetration testing?

<p>Maximizes the testing time available (B)</p> Signup and view all the answers

What must be established before beginning a penetration test?

<p>Rules of Engagement including IP addresses (C)</p> Signup and view all the answers

Which of the following best describes 'defense in depth'?

<p>Multiple protection layers across the infrastructure (D)</p> Signup and view all the answers

What is the definition of cyber resilience?

<p>Maintaining functionality despite adverse cyber events (C)</p> Signup and view all the answers

What is a key limitation of black box testing compared to white box testing?

<p>It has a narrower testing scope (B)</p> Signup and view all the answers

What is the primary purpose of vulnerability analysis?

<p>To examine the effectiveness of security controls (C)</p> Signup and view all the answers

Which phase is NOT part of system hacking methodology?

<p>Threat Modeling (C)</p> Signup and view all the answers

What do Tactics, Techniques, and Procedures (TTPs) help identify?

<p>Behavior of threat actors during attacks (C)</p> Signup and view all the answers

Which of the following is NOT a category of Indicators of Compromise (IoCs)?

<p>Environmental Indicators (A)</p> Signup and view all the answers

What best describes the role of the Cyber Kill Chain methodology?

<p>To enhance intrusion detection and response (A)</p> Signup and view all the answers

Which of the following is a technique used in the social engineering stage of an attack?

<p>Sending spoof emails to collect information (D)</p> Signup and view all the answers

Which type of actions does the procedures within TTPs describe?

<p>The sequence of actions performed by attackers (B)</p> Signup and view all the answers

What type of data is NOT considered as an indicator of compromise?

<p>Standard firewall configurations (D)</p> Signup and view all the answers

What is a key aspect of the MITRE ATT&CK Framework?

<p>A globally accessible knowledge base of adversary tactics and techniques (C)</p> Signup and view all the answers

What is NOT one of the four categories of IoCs?

<p>File Indicators (A)</p> Signup and view all the answers

Which of the following describes 'Tactics' in the context of TTPs?

<p>Guidelines that outline how attackers approach their attacks (B)</p> Signup and view all the answers

Which of the following is a common sign of a potential intruder within a network?

<p>Increased database read volume (C)</p> Signup and view all the answers

Which of these is NOT part of the phases that attackers follow according to the Cyber Kill Chain?

<p>Data Collection (A)</p> Signup and view all the answers

Flashcards

Cyber Security

Protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction, to ensure confidentiality, integrity, and availability.

Information Security (InfoSec)

Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction, emphasizing confidentiality, integrity, and availability.

Confidentiality

Ensuring that information is only accessible to authorized users.

Integrity

Guaranteeing that information is accurate and hasn't been altered without authorization.

Signup and view all the flashcards

Availability

Ensuring that authorized users can access information and resources when needed.

Signup and view all the flashcards

Symmetric Encryption

Uses the same key for encryption and decryption.

Signup and view all the flashcards

Asymmetric Encryption

Uses separate keys for encryption and decryption.

Signup and view all the flashcards

Hacking Methodology

Systematic approaches used by hackers to gain unauthorized access to computer systems or networks.

Signup and view all the flashcards

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

Signup and view all the flashcards

Social Engineering

Tricking people into revealing confidential information or performing actions that compromise security.

Signup and view all the flashcards

Information Security (InfoSec)

The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

Signup and view all the flashcards

Confidentiality

Ensuring that information is accessible only to authorized individuals or systems.

Signup and view all the flashcards

Integrity

Maintaining the trustworthiness and accuracy of data by preventing unauthorized changes.

Signup and view all the flashcards

Availability

Ensuring that information systems and data are accessible to authorized users when needed.

Signup and view all the flashcards

Authenticity

Verifying the identity of a user or entity before granting access.

Signup and view all the flashcards

Non-repudiation

Guaranteeing that a sender or receiver cannot deny sending or receiving a message or data.

Signup and view all the flashcards

Cyber Security

Protecting the use of cyberspace and anything in the digital realm from malicious attacks.

Signup and view all the flashcards

IT Security

The protection of information technologies.

Signup and view all the flashcards

Cybersecurity

Protecting digital assets and infrastructure from cyberattacks, minimizing risks and impacts.

Signup and view all the flashcards

Defense (in Cybersecurity)

The process of protecting critical digital assets by preventing attacks, hardening systems, and detecting threats.

Signup and view all the flashcards

Cyberwarfare

The use of digital attacks in warfare, considered a fifth domain of battle alongside land, sea, air, and space.

Signup and view all the flashcards

Vulnerability (in Cybersecurity)

A weakness in a system that, if exploited, can lead to damage or loss.

Signup and view all the flashcards

Risk (in Cybersecurity)

The potential for loss, damage, or destruction of an asset due to a threat exploiting a vulnerability.

Signup and view all the flashcards

Blue Team

The cyber security team that defends against attackers and red teams.

Signup and view all the flashcards

Red Team

Ethical hackers who simulate attacks to test security.

Signup and view all the flashcards

Penetration Test (PenTest)

Assessing security by simulating real-world attacks.

Signup and view all the flashcards

White Box PenTest

Security testing with full knowledge of the system.

Signup and view all the flashcards

Black Box PenTest

Security testing with no prior knowledge of the system.

Signup and view all the flashcards

Rules of Engagement (RoE)

Official permission for penetration testing, outlining specific boundaries and parameters.

Signup and view all the flashcards

Defense in Depth

Using multiple layers of security for enhanced protection.

Signup and view all the flashcards

Cyber Resilience

Ensuring continued operation despite cyber threats.

Signup and view all the flashcards

Cybersecurity Attacks

Attacks motivated by a goal (motive), utilizing specific methods to exploit vulnerabilities in a target system.

Signup and view all the flashcards

Attack Motives

Reasons behind cyberattacks, ranging from disrupting operations to gaining financial gain or achieving political objectives.

Signup and view all the flashcards

Passive Attacks

Cyberattacks that observe and monitor network traffic without altering data.

Signup and view all the flashcards

Active Attacks

Cyberattacks that actively alter or disrupt data and systems.

Signup and view all the flashcards

Close-in Attacks

Attacks where the attacker is physically near the target.

Signup and view all the flashcards

Insider Attacks

Attacks from within a trusted environment via privileged access to critical assets.

Signup and view all the flashcards

Distribution Attacks

Attacks that involve compromising systems before installation or use.

Signup and view all the flashcards

Footprinting

Gathering information about a target system before launching an attack.

Signup and view all the flashcards

Ethical Hacking Process

A step-by-step process mirroring attack methodology, but with ethical intent instead.

Signup and view all the flashcards

Reconnaissance

The pre-attack stage involving gathering data like IP addresses and employee information about the target.

Signup and view all the flashcards

Enumeration (Cybersecurity)

Actively querying a target system to gain info like user lists, routing tables, security flaws, and shared resources.

Signup and view all the flashcards

Vulnerability Analysis

Assessing a system's security weaknesses, including existing security measures.

Signup and view all the flashcards

System Hacking Methodology

A series of steps followed by attackers to breach a system: gain access, escalate privileges, maintain access, and cover tracks.

Signup and view all the flashcards

Cyber Kill Chain

A methodology for identifying and preventing malicious activity.

Signup and view all the flashcards

TTPs (Tactics, Techniques, Procedures)

Activities and methods used by attackers; categorized into tactics (overall approach), techniques (specific actions), and procedures (step-by-step actions).

Signup and view all the flashcards

Tactics (in TTPs)

The overall method or guidelines for attacking a target.

Signup and view all the flashcards

Techniques (in TTPs)

Specific methods used by attackers to achieve intermediate steps during an attack.

Signup and view all the flashcards

Procedures (in TTPs)

Sets of actions attackers follow to carry out tactics.

Signup and view all the flashcards

Indicators of Compromise (IoCs)

Clues, artifacts, or data indicating possible malicious activity.

Signup and view all the flashcards

MITRE ATT&CK Framework

A publicly available knowledge base of adversary tactics and techniques.

Signup and view all the flashcards

Amateur Attacker

A hacker with little to no experience and limited motivations.

Signup and view all the flashcards

Email Indicators (IoCs)

Clues related to emails, like sender, subject, or attachments that might indicate a malicious activity.

Signup and view all the flashcards

Network Indicators (IoCs)

Network-related artifacts, such as URLs, domain names, or IP addresses, that could reveal malicious activity.

Signup and view all the flashcards

Host-Based Indicators (IoCs)

Suspicious activity on a host machine, such as files, registry keys, or DLLs that should not be present, that might hint at breach.

Signup and view all the flashcards

Behavioral Indicators (IoCs)

Unusual behaviors on a system or network, like code injection or PowerShell script execution, that could point to malicious activity.

Signup and view all the flashcards

Study Notes

Course Information

  • Course name: SENG 411 Cyber Security
  • Instructor: Dr. Emin Emrah ÖzsavaÅŸ
  • Email: [email protected]

Course Aims & Scope

  • Describe the elements of cyber security
  • Explain cyber threats and attacks
  • Describe hacking methodologies
  • Understand security controls and countermeasures
  • Understand security governance

Textbooks & Material

  • Ethical Hacking and Countermeasures Ver. 12, EC-Council 2022
  • Praise for CISSP All-in-One Exam Guide, Fernando Maymi, Shon Harris, McGraw Hill 2022
  • Practical Information Security Management: A Complete Guide to Planning and Implementation, Tony Campbell, Apress 2016

Syllabus

  • Week 1: Introduction and Basics - Language of security, overview, Identity and Access Management, System Architectures - Identification, authentication, authorization, access control, system architecture concepts
  • Week 2: Identity and Access Management, Systems Architectures - Access control, architecture concepts, identity and access management
  • Week 3: Cryptography - Symmetric and asymmetric encryption, hash functions, digital signatures
  • Week 4: Network Security - Network attacks, security architectures, countermeasures
  • Week 5: Hacking Methodology - Footprinting and reconnaissance, scanning networks, enumeration, vulnerability analysis
  • Week 6: Hacking Methodology and Sniffing - System hacking (gaining access, escalating privileges, maintaining access, clearing logs) sniffing concepts and techniques
  • Week 7: Malware Threats - Malware concepts, APT, trojan, virus, worm, analysis, countermeasures
  • Week 8: Social Engineering and Session Hijacking - Concepts, threats, countermeasures
  • Week 9: Web Server and Web Application Security - Concepts, threats, countermeasures
  • Week 10: Mobile and Cloud Security - Concepts, threats, countermeasures
  • Week 11: Wireless, IoT, and OT Security - Concepts, threats, countermeasures
  • Week 12: Security Operations, Role of AI/ML - Threat intelligence, digital evidence and incident response, digital forensics, AI/ML in security posture
  • Week 13: Security Governance - Risk management, organizational security, security implementation, secure system development
  • Week 14: General Review

Grading

  • Assignments & quizzes
  • Midterm exam
  • Final exam

InfoSec Concepts

  • Information Security: Protection of information from unauthorized access, use, disclosure, disruption, modification, or destruction. Confidentiality, integrity, and availability are key aspects.
  • Information Technology Security (IT Security): Protection of information technologies.
  • Cybersecurity: Protecting cyberspace from cyberattacks. Includes information and non-information assets.

CIA Triad

  • Confidentiality: Access is limited to authorized users.
  • Integrity: Data and resources are trustworthy and free of unauthorized changes.
  • Availability: Resources are accessible when needed by authorized users.

InfoSec Details

  • Vulnerability: Weakness in a system that can be exploited.
  • Threat: An action that exploits a vulnerability.
  • Attack: Intentional exploitation of a vulnerability.
  • Countermeasure: Measures to resolve vulnerabilities and mitigate threats.
  • Risk: Potential for loss, damage, or destruction of an asset, resulting from a threat exploiting a vulnerability.

Cyber Security

  • Motive: Goal behind cyberattacks,
  • Attacks: Motive + Method + Vulnerability
  • Cyberwarfare: Cyberattacks related to conflict (fifth domain of battle).
  • Cyber Resilience: Delivering the intended outcome despite adverse cyber events.

Hacking Methodology (CEH)

  • Footprinting: Gathering information about the target.
  • Scanning: Identifying active hosts and open ports.
  • Enumeration: Actively probing the target system.
  • Vulnerability Analysis: Identifying weaknesses.
  • System Hacking: Gaining access, escalating privileges, maintaining access, and clearing logs.
  • Cyber Kill Chain: Methodology for understanding and preventing attacks (reconnaissance, weaponization, delivery, exploitation, installation, and actions on objectives).
  • Tactics, Techniques, and Procedures (TTPs): Activities, methods, and procedures employed by attackers (tactics are high-level, techniques are specific actions, and procedures are the sequence).
  • Indicators of Compromise (IOCs): Clues or artifacts indicating a possible intrusion.
  • MITRE ATT&CK: Framework for understanding and responding to cyberattacks.

Penetration Testing (PenTesting)

  • Methods: Black-box (no prior knowledge), White-box (complete knowledge), Gray-box (limited knowledge)
  • Goals: Assessing security before an attack.
  • Tools: Software that simulates real-world attacks.
  • Rules of Engagement (RoE): Clear permission before starting with appropriate constraints.

Teams

  • Blue Team: Defensive security team
  • Red Team: Attack team, simulates malicious activity

Types of Attackers

  • Amateur: Uses readily available tools
  • Hacker (Cracker): Knows hacking techniques (intentional)
  • State-Funded Spy: Government-supported
  • Terrorist: Actively harmful agendas

Ethical Hackers' Attributes

  • Professional and ethical values.
  • No hidden agenda.
  • Obtain permission.
  • Proper reporting.
  • No damage to systems tested.
  • Technical expertise (OS, networking, attacks)
  • Organizational security policies and standards.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser