Podcast
Questions and Answers
What are the primary focuses of defense in cybersecurity?
What are the primary focuses of defense in cybersecurity?
- Prevention and threat detection (correct)
- Increasing attack surfaces and exploiting vulnerabilities
- Alerting stakeholders about potential vulnerabilities
- Hacking systems to test their resilience
What distinguishes a threat from a vulnerability in cybersecurity?
What distinguishes a threat from a vulnerability in cybersecurity?
- Threats only arise if vulnerabilities are exploited.
- A vulnerability refers to a threat that is likely to occur.
- A vulnerability is an actual attack while a threat can be merely a suggestion.
- A threat is an actual attack whereas a vulnerability is a potential weakness. (correct)
Which of the following is NOT a basic component of cybersecurity?
Which of the following is NOT a basic component of cybersecurity?
- Encryption (correct)
- Threat
- Vulnerability
- Countermeasure
In the context of cybersecurity, what does a countermeasure aim to do?
In the context of cybersecurity, what does a countermeasure aim to do?
How was cyber warfare recognized as a significant threat in 2011?
How was cyber warfare recognized as a significant threat in 2011?
What does the principle of confidentiality in information security ensure?
What does the principle of confidentiality in information security ensure?
Why is integrity important in information security?
Why is integrity important in information security?
Which of the following is closely related to the availability principle in information security?
Which of the following is closely related to the availability principle in information security?
What does non-repudiation guarantee in the context of information security?
What does non-repudiation guarantee in the context of information security?
In the context of info assurance, what additional elements are combined with the CIA triad?
In the context of info assurance, what additional elements are combined with the CIA triad?
Which method is primarily used to ensure data integrity?
Which method is primarily used to ensure data integrity?
To verify the identity of a user, which type of authentication is NOT commonly used?
To verify the identity of a user, which type of authentication is NOT commonly used?
How is authenticity typically ensured in communications?
How is authenticity typically ensured in communications?
What is the primary aim of information security?
What is the primary aim of information security?
Which of the following is NOT a component of the hacking methodology discussed?
Which of the following is NOT a component of the hacking methodology discussed?
What does the term 'APT' refer to in the context of malware threats?
What does the term 'APT' refer to in the context of malware threats?
Which type of encryption involves a single key for both encryption and decryption?
Which type of encryption involves a single key for both encryption and decryption?
Which session hijacking technique involves intercepting communication between the user and the server?
Which session hijacking technique involves intercepting communication between the user and the server?
What is one of the main purposes of digital forensics in security operations?
What is one of the main purposes of digital forensics in security operations?
What is a primary focus of risk management in security governance?
What is a primary focus of risk management in security governance?
Which of these topics is covered under mobile and cloud security?
Which of these topics is covered under mobile and cloud security?
What is the primary focus of ethical hacking?
What is the primary focus of ethical hacking?
Which concept is closely associated with the analysis and prevention of social engineering threats?
Which concept is closely associated with the analysis and prevention of social engineering threats?
What is considered a passive attack?
What is considered a passive attack?
Which motive is related to disrupting the operational capabilities of a business?
Which motive is related to disrupting the operational capabilities of a business?
Which of the following is an active attack?
Which of the following is an active attack?
What characterizes insider attacks?
What characterizes insider attacks?
Which type of attack involves an attacker being in physical proximity to the target?
Which type of attack involves an attacker being in physical proximity to the target?
What is the main goal of distribution attacks?
What is the main goal of distribution attacks?
Which method is typically associated with footprinting?
Which method is typically associated with footprinting?
Which technique is commonly used in active attacks?
Which technique is commonly used in active attacks?
Which motive involves seeking revenge on an individual or organization?
Which motive involves seeking revenge on an individual or organization?
What type of attack includes methods like dumpster diving and shoulder surfing?
What type of attack includes methods like dumpster diving and shoulder surfing?
What is the primary role of the blue team in cybersecurity?
What is the primary role of the blue team in cybersecurity?
What is a disadvantage of conducting black box penetration testing?
What is a disadvantage of conducting black box penetration testing?
What is the purpose of penetration testing tools?
What is the purpose of penetration testing tools?
What is a significant pro of white box penetration testing?
What is a significant pro of white box penetration testing?
What must be established before beginning a penetration test?
What must be established before beginning a penetration test?
Which of the following best describes 'defense in depth'?
Which of the following best describes 'defense in depth'?
What is the definition of cyber resilience?
What is the definition of cyber resilience?
What is a key limitation of black box testing compared to white box testing?
What is a key limitation of black box testing compared to white box testing?
What is the primary purpose of vulnerability analysis?
What is the primary purpose of vulnerability analysis?
Which phase is NOT part of system hacking methodology?
Which phase is NOT part of system hacking methodology?
What do Tactics, Techniques, and Procedures (TTPs) help identify?
What do Tactics, Techniques, and Procedures (TTPs) help identify?
Which of the following is NOT a category of Indicators of Compromise (IoCs)?
Which of the following is NOT a category of Indicators of Compromise (IoCs)?
What best describes the role of the Cyber Kill Chain methodology?
What best describes the role of the Cyber Kill Chain methodology?
Which of the following is a technique used in the social engineering stage of an attack?
Which of the following is a technique used in the social engineering stage of an attack?
Which type of actions does the procedures within TTPs describe?
Which type of actions does the procedures within TTPs describe?
What type of data is NOT considered as an indicator of compromise?
What type of data is NOT considered as an indicator of compromise?
What is a key aspect of the MITRE ATT&CK Framework?
What is a key aspect of the MITRE ATT&CK Framework?
What is NOT one of the four categories of IoCs?
What is NOT one of the four categories of IoCs?
Which of the following describes 'Tactics' in the context of TTPs?
Which of the following describes 'Tactics' in the context of TTPs?
Which of the following is a common sign of a potential intruder within a network?
Which of the following is a common sign of a potential intruder within a network?
Which of these is NOT part of the phases that attackers follow according to the Cyber Kill Chain?
Which of these is NOT part of the phases that attackers follow according to the Cyber Kill Chain?
Flashcards
Cyber Security
Cyber Security
Protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction, to ensure confidentiality, integrity, and availability.
Information Security (InfoSec)
Information Security (InfoSec)
Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction, emphasizing confidentiality, integrity, and availability.
Confidentiality
Confidentiality
Ensuring that information is only accessible to authorized users.
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Symmetric Encryption
Symmetric Encryption
Signup and view all the flashcards
Asymmetric Encryption
Asymmetric Encryption
Signup and view all the flashcards
Hacking Methodology
Hacking Methodology
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Information Security (InfoSec)
Information Security (InfoSec)
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Authenticity
Authenticity
Signup and view all the flashcards
Non-repudiation
Non-repudiation
Signup and view all the flashcards
Cyber Security
Cyber Security
Signup and view all the flashcards
IT Security
IT Security
Signup and view all the flashcards
Cybersecurity
Cybersecurity
Signup and view all the flashcards
Defense (in Cybersecurity)
Defense (in Cybersecurity)
Signup and view all the flashcards
Cyberwarfare
Cyberwarfare
Signup and view all the flashcards
Vulnerability (in Cybersecurity)
Vulnerability (in Cybersecurity)
Signup and view all the flashcards
Risk (in Cybersecurity)
Risk (in Cybersecurity)
Signup and view all the flashcards
Blue Team
Blue Team
Signup and view all the flashcards
Red Team
Red Team
Signup and view all the flashcards
Penetration Test (PenTest)
Penetration Test (PenTest)
Signup and view all the flashcards
White Box PenTest
White Box PenTest
Signup and view all the flashcards
Black Box PenTest
Black Box PenTest
Signup and view all the flashcards
Rules of Engagement (RoE)
Rules of Engagement (RoE)
Signup and view all the flashcards
Defense in Depth
Defense in Depth
Signup and view all the flashcards
Cyber Resilience
Cyber Resilience
Signup and view all the flashcards
Cybersecurity Attacks
Cybersecurity Attacks
Signup and view all the flashcards
Attack Motives
Attack Motives
Signup and view all the flashcards
Passive Attacks
Passive Attacks
Signup and view all the flashcards
Active Attacks
Active Attacks
Signup and view all the flashcards
Close-in Attacks
Close-in Attacks
Signup and view all the flashcards
Insider Attacks
Insider Attacks
Signup and view all the flashcards
Distribution Attacks
Distribution Attacks
Signup and view all the flashcards
Footprinting
Footprinting
Signup and view all the flashcards
Ethical Hacking Process
Ethical Hacking Process
Signup and view all the flashcards
Reconnaissance
Reconnaissance
Signup and view all the flashcards
Enumeration (Cybersecurity)
Enumeration (Cybersecurity)
Signup and view all the flashcards
Vulnerability Analysis
Vulnerability Analysis
Signup and view all the flashcards
System Hacking Methodology
System Hacking Methodology
Signup and view all the flashcards
Cyber Kill Chain
Cyber Kill Chain
Signup and view all the flashcards
TTPs (Tactics, Techniques, Procedures)
TTPs (Tactics, Techniques, Procedures)
Signup and view all the flashcards
Tactics (in TTPs)
Tactics (in TTPs)
Signup and view all the flashcards
Techniques (in TTPs)
Techniques (in TTPs)
Signup and view all the flashcards
Procedures (in TTPs)
Procedures (in TTPs)
Signup and view all the flashcards
Indicators of Compromise (IoCs)
Indicators of Compromise (IoCs)
Signup and view all the flashcards
MITRE ATT&CK Framework
MITRE ATT&CK Framework
Signup and view all the flashcards
Amateur Attacker
Amateur Attacker
Signup and view all the flashcards
Email Indicators (IoCs)
Email Indicators (IoCs)
Signup and view all the flashcards
Network Indicators (IoCs)
Network Indicators (IoCs)
Signup and view all the flashcards
Host-Based Indicators (IoCs)
Host-Based Indicators (IoCs)
Signup and view all the flashcards
Behavioral Indicators (IoCs)
Behavioral Indicators (IoCs)
Signup and view all the flashcards
Study Notes
Course Information
- Course name: SENG 411 Cyber Security
- Instructor: Dr. Emin Emrah Özsavaş
- Email: [email protected]
Course Aims & Scope
- Describe the elements of cyber security
- Explain cyber threats and attacks
- Describe hacking methodologies
- Understand security controls and countermeasures
- Understand security governance
Textbooks & Material
- Ethical Hacking and Countermeasures Ver. 12, EC-Council 2022
- Praise for CISSP All-in-One Exam Guide, Fernando Maymi, Shon Harris, McGraw Hill 2022
- Practical Information Security Management: A Complete Guide to Planning and Implementation, Tony Campbell, Apress 2016
Syllabus
- Week 1: Introduction and Basics - Language of security, overview, Identity and Access Management, System Architectures - Identification, authentication, authorization, access control, system architecture concepts
- Week 2: Identity and Access Management, Systems Architectures - Access control, architecture concepts, identity and access management
- Week 3: Cryptography - Symmetric and asymmetric encryption, hash functions, digital signatures
- Week 4: Network Security - Network attacks, security architectures, countermeasures
- Week 5: Hacking Methodology - Footprinting and reconnaissance, scanning networks, enumeration, vulnerability analysis
- Week 6: Hacking Methodology and Sniffing - System hacking (gaining access, escalating privileges, maintaining access, clearing logs) sniffing concepts and techniques
- Week 7: Malware Threats - Malware concepts, APT, trojan, virus, worm, analysis, countermeasures
- Week 8: Social Engineering and Session Hijacking - Concepts, threats, countermeasures
- Week 9: Web Server and Web Application Security - Concepts, threats, countermeasures
- Week 10: Mobile and Cloud Security - Concepts, threats, countermeasures
- Week 11: Wireless, IoT, and OT Security - Concepts, threats, countermeasures
- Week 12: Security Operations, Role of AI/ML - Threat intelligence, digital evidence and incident response, digital forensics, AI/ML in security posture
- Week 13: Security Governance - Risk management, organizational security, security implementation, secure system development
- Week 14: General Review
Grading
- Assignments & quizzes
- Midterm exam
- Final exam
InfoSec Concepts
- Information Security: Protection of information from unauthorized access, use, disclosure, disruption, modification, or destruction. Confidentiality, integrity, and availability are key aspects.
- Information Technology Security (IT Security): Protection of information technologies.
- Cybersecurity: Protecting cyberspace from cyberattacks. Includes information and non-information assets.
CIA Triad
- Confidentiality: Access is limited to authorized users.
- Integrity: Data and resources are trustworthy and free of unauthorized changes.
- Availability: Resources are accessible when needed by authorized users.
InfoSec Details
- Vulnerability: Weakness in a system that can be exploited.
- Threat: An action that exploits a vulnerability.
- Attack: Intentional exploitation of a vulnerability.
- Countermeasure: Measures to resolve vulnerabilities and mitigate threats.
- Risk: Potential for loss, damage, or destruction of an asset, resulting from a threat exploiting a vulnerability.
Cyber Security
- Motive: Goal behind cyberattacks,
- Attacks: Motive + Method + Vulnerability
- Cyberwarfare: Cyberattacks related to conflict (fifth domain of battle).
- Cyber Resilience: Delivering the intended outcome despite adverse cyber events.
Hacking Methodology (CEH)
- Footprinting: Gathering information about the target.
- Scanning: Identifying active hosts and open ports.
- Enumeration: Actively probing the target system.
- Vulnerability Analysis: Identifying weaknesses.
- System Hacking: Gaining access, escalating privileges, maintaining access, and clearing logs.
- Cyber Kill Chain: Methodology for understanding and preventing attacks (reconnaissance, weaponization, delivery, exploitation, installation, and actions on objectives).
- Tactics, Techniques, and Procedures (TTPs): Activities, methods, and procedures employed by attackers (tactics are high-level, techniques are specific actions, and procedures are the sequence).
- Indicators of Compromise (IOCs): Clues or artifacts indicating a possible intrusion.
- MITRE ATT&CK: Framework for understanding and responding to cyberattacks.
Penetration Testing (PenTesting)
- Methods: Black-box (no prior knowledge), White-box (complete knowledge), Gray-box (limited knowledge)
- Goals: Assessing security before an attack.
- Tools: Software that simulates real-world attacks.
- Rules of Engagement (RoE): Clear permission before starting with appropriate constraints.
Teams
- Blue Team: Defensive security team
- Red Team: Attack team, simulates malicious activity
Types of Attackers
- Amateur: Uses readily available tools
- Hacker (Cracker): Knows hacking techniques (intentional)
- State-Funded Spy: Government-supported
- Terrorist: Actively harmful agendas
Ethical Hackers' Attributes
- Professional and ethical values.
- No hidden agenda.
- Obtain permission.
- Proper reporting.
- No damage to systems tested.
- Technical expertise (OS, networking, attacks)
- Organizational security policies and standards.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.