What is the primary objective of an Advanced Persistent Threat (APT)?
To gain stealthy, long-term access to a targeted system for data exfiltration.
An APT campaign can often exist for several _____ and may be well funded.
years
What is a common entry point exploited by APTs to penetrate a system?
The end user (insider), often through vulnerabilities like poor passwords.
How do APTs often evade detection by security tools like firewalls and SIEMs?
By creating network traffic that is purposely designed to look like legitimate traffic.
What is the ‘Reconnaissance’ stage in an APT attack?
The phase where attackers gather as much information as possible about the target’s systems, processes, and potential entry points.
What occurs during the ‘Initial Compromise’ stage of an APT attack?
The attacker gains their first access or ‘foothold’ in a system, often through social engineering.
The APT stage where an attacker expands access across systems, compromises additional devices, or increases permissions is known as _____.
Lateral Movement
What is ‘Data Exfiltration’ in the context of an APT?
The process of sending stolen data through outbound traffic from the compromised network to the attacker’s devices.
What are the two key activities in the final stage of an APT attack cycle?
Maintenance of access to the systems and concealment of any evidence of the compromise.
In Unix-like systems, what are the three user classifications for file permissions?
Owner, Group, and World (or Other).
What do the characters ‘r’, ‘w’, and ‘x’ represent in Unix file permissions?
Read, write, and execute permissions, respectively.
What permissions are represented by the notation rwxrw-r--?
The owner has read, write, and execute; the group has read and write; others have read-only.
In the context of digital images, what is a bitplane?
A matrix comprising the i-th bit of each pixel in a digital image for a specific colour channel.
In the BPCS steganography algorithm, how is the complexity of a segment determined?
By calculating the ratio of the segment’s border changes to the maximum possible border changes (a checkerboard pattern).
According to the BPCS algorithm, a segment is considered ‘complex’ enough to hide data if its complexity value is greater than _____.
0.3
If a payload block in BPCS is not complex, what operation is performed before hiding it?
It is conjugated by performing an exclusive OR (XOR) operation with a checkerboard pattern.
What is the definition of a biometric trait for user access control?
A sufficiently distinctive trait that can be measured, quantified, and stored for authentication.
What are the two main categories of biometrics?
Physical and behavioural.
What is the ‘Enrolment’ stage in a biometric system?
The initial process where a user’s biometric trait is captured and a template is extracted and stored.
Metric: False Accept Rate (FAR)
Definition: A measure of the likelihood that a biometric system will incorrectly accept an unauthorised user.
Metric: False Reject Rate (FRR)
Definition: A measure of the likelihood that a biometric system will incorrectly reject an authorised user.
What does a Receiver Operating Characteristic (ROC) curve plot in biometrics?
The True Accept Rate (TAR) against the False Accept Rate (FAR) at various threshold settings.
Which biometric method is claimed to be highly accurate, producing only 1 in 1-2 million false positives?
Iris recognition.
Which biometric method is considered more invasive than iris scanning and can be affected by disease over time?
Retinal scanning.