Cyber Attacks Flashcards

(12 cards)

1
Q

Icefall Vunerability Causes

A
  • Insecure engineering protocols
  • Weak cryptography or broken auth schemes
  • Insecure firmware updates
  • RCE via native functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Development Trade-Off

A

trade off between devivering products quickly or delivering secure products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triangle

A
  • Confidentiality
  • Availability
  • Integrity

you can have any two trivially, having all 3 is difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware Security Module

A
  • Confidentiality - keys are stored in the HSM with defined access procedures rather than ‘anywhere’
  • Availability - Seperate hardware, not impacted by randomware
  • Integrity - with HSMs changes to an enterprises keys must be approved by more than one person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

Integrity of logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authenticity

A

integrity of addressing information and logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation

A

confidentiality of signature information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

the practice of manipulating individuals to divulge sensitive information or perform actions that compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

social engineering via email, generally bulk email expecting a small proportion of the targets to succumb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spear Phishing

A

rather than bulk phishing this targets a specific individual

can be quite difficult to spot because it is tailored to a single person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smishing

A

Phishing via SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vishing

A

Phishing over voice calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly