Shared Flashcard Set

Details

Security + || 1.1 Indicators of Compromise (Slides)
Security + || 1.1 Indicators of Compromise (Slides)
64
Computer Science
Undergraduate 4
12/10/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Why is Security Important?
Definition
Increasing computer crime
Term
Effective security is as much about what as it is about technology?
Definition
People and Operations
Term
What are examples of Increasing Computer Crime?
Definition
oTheft

oFraud

oVandalism
Term
What are the following?:

•Tangible

•Intangible

•Employees

•Market value

•Liabilities
Definition
Examples of Assets
Term
What are examples of Liabilities?
Definition
oBusiness continuity

oLegal
Term
What are these the element of?:

•Confidentiality

•Integrity

•Availability
Definition
The CIA Triad
Term
What is something that confirms that you completed an action, so that you cannot deny completing said action?
Definition
Non-Repudiation
Term
What is a commitment to secure working practices in the form of tested, documented procedures and security controls?
Definition
Security Policy
Term
What are the following?:

•Overall responsibility

•Managerial

•Technical

•Non-technical

•Legal / regulatory
Definition
Important Roles and Responsibilities
Term
What is having a number of different people doing different parts of a job?
Definition
Separation of Duties
Term
National Institute of Standards and Technology)
Definition
NIST
Term
Federal Information Processing Standards
Definition
FIPS
Term
What is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach?
Definition
Vulnerability
Term
What is the potential for a threat agent or threat actor to "exercise" a vulnerability or the path or tool used by the threat actor can be referred to as the threat vector?
Definition
Threat
Term
What is the likelihood and impact (or consequence) of a actor exercising a vulnerability?
Definition
Risk
Term
What is a system or procedure put in place to mitigate risk?
Definition
Control
Term
What is a threat from someone who has authorized access?
Definition
Malicious Insider
Term
What is the reduction of risk?
Definition
Mitigation
Term
What is the use of an exploit to obtain a pivot point using a Command and Control (C2 or C&C) network and involves installing tools to maintain covert access?
Definition
Weaponization
Term
Who is someone that builds tools that can be used to work their way into a system?
Definition
Hacker
Term
Who is someone who specifically works to find passwords and other information?
Definition
Cracker
Term
What is a benevolent hacker?
Definition
White Hat
Term
What is a malevolent hacker?
Definition
Black Hat
Term
What is a neutral hacker?
Definition
Gray Hat
Term
What is a Penetration Test?
Definition
A test of a system done by a White Hat, as if they were a Black Hat.
Term
What is a type of Penetration Test completed without any knowledge of the system?
Definition
Black Box
Term
What is a type of Penetration Test completed with knowledge of the system?
Definition
White Box
Term
What is a person who acts as a hacker but doesn't have the technical knowledge to create their own tools?
Definition
Script Kiddies
Term
What is only allowing employees enough privileges to complete their tasks?
Definition
Least Privilege
Term
What are the following?:

•Planning / scoping
•Reconnaissance / discovery •Weaponization
•Post-exploitation
•Action on objectives
•Retreat
Definition
The Steps Of The Kill Chain
Term
What is the Kill Chain?
Definition
Lifecycle of Attacks
Term
What is a system used for Pivoting?
Definition
Pivot Point
Term
What is attacking one system to then gain information to allow you to then attack another system?
Definition
Pivoting
Term
What are the following?:

•Observable
•Indicator
•Incident
•Tactics, Techniques, and Procedures (TTP)
•Campaign and Threat Actor
•Exploit Target
•Course of Action (CoA)
Definition
Indicators of Compromise
Term
Course of Action
Definition
CoA
Term
Tactics, Techniques and Procedures
Definition
TTP
Term
What is dominating or charming targets into revealing information or providing access that exploits “weak authentication” over telephone / IM / email?
Definition
Impersonation
Term
What is the search of information for an attack through a target's trash?
Definition
Dumpster Diving
Term
What is the secret and direct observation of a target's information?
Definition
Shoulder Surfing
Term
What is an attack completed by simply accessing an insecure system while the system user is away?
Definition
Lunch Time Attack
Term
What is evading security by simply walking in behind those with proper clearance?
Definition
Tailgaiting
Term
What is a widely targeted attack at grabbing information?

It normally involves using spoofed electronic communications to trick a user into providing confidential information.
Definition
Phishing
Term
What is a focused attack on a specific group for grabbing information?
Definition
Spear Phishing
Term
What is an extremely focused attack on a specific individual for grabbing information?
Definition
Whale Phishing
Term
What is a telephone, IM, Social Media type of Phishing attack?
Definition
Vhishing
Term
What is a redirect attack?
Definition
Pharming
Term
What is an attack that presents itself as something true, in order to encourage spreading?
Definition
Hoax
Term
What is malware that relies on a host file and contains a payload?
Definition
Computer Viruses
Term
What propagates in memory over network links, consumes bandwidth and may be able to compromise application or OS to deliver payload?
Definition
Worms
Term
What is a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects?
Definition
Logic Bomb
Term
What is a malicious program concealed within a benign one?
Definition
Trojan
Term
RAT
Definition
Remote Access Trojan
Term
What allows an attacker to record system configuration and user actions?
Definition
Spyware
Term
What records some user activity but to lesser extent than spyware and uses cookies to deliver targeted adverts?
Definition
Adware
Term
What malware replaces key system files and utilities?
Definition
Rootkits
Term
What is malware that locks out a system that is simply a nuisance?
Definition
Ransomware
Term
What is malware that locks out a system and encrypts the information it locks out?
Definition
Crypto-malware
Term
What is Phishing that targets a third-party site?
Definition
Watering Hole
Term
What is locating information that the target may not regard as exploitable or may not even know they have disclosed?
Definition
Open Source Intelligence
Term
What is getting a list of valid email recipients at a target domain to use as a Pivot Point?
Definition
Email Harvesting
Term
What is scanning corporate social media accounts and feeds to then use as a Pivot Point?
Definition
Social Media Profiling
Term
What are parts of WWW not indexed by or accessible to search engines?
Definition
Deep Web
Term
What is a network established over the Internet (overlay) but that requires client software to access (TOR, Freenet, I2P)?
Definition
Dark Net
Term
What are sites and content hosted on dark nets?
Definition
Dark Web
Supporting users have an ad free experience!