Module 5: Threats Flashcards

(59 cards)

1
Q

Social engineering

A manipulation technique that exploits h____ e____ to gain private i_________, a_____, or v________

A

human error; information, access; valuables;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stages of social engineering
1) P_____
2) Establish t____
3) Use p________ tactics
4) D________ from the target

A

Prepare;
trust;
persuasion;
Disconnect;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Preventing social engineering
- Implementing m_________ controls
- Staying informed of t______
- Sharing your k_________ with others

A

managerial;
trends;
knowledge;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common types of social engineering
- B_____
- P______
- Q___ p__ q__
- T_________
- W________ h___

A

Baiting;
Phishing;
Quid pro quo;
Tailgating;
Watering hole;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baiting

  • Tempts people into compromising their s_______
  • A common example is _ _ _ baiting that relies on someone finding an i_______ _ _ _ drive and plugging it into their device
A

security;
USB; infected USB;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

The use of d_____ c__________ to trick people into revealing s_______ data or deploying m________ s_______.

A

digital communications;
sensitive; malicious software;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Quid pro quo

  • A type of baiting used to trick someone into believing that they’ll be r________ for sharing a_____, i__________ or m____.
  • Eg. attacker impersonates a loan officer
A

rewarded; access, information; money;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tailgating

  • Social engineering tactic in which u__________ people follow an a_________ person into a r________ area.
  • Also sometimes referred to as p___________.
A

unauthorized; authorized; restricted;
piggybacking;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Watering hole

  • When a t_____ a____ compromises a w______ frequently visited by a specific g_____ of u____.
  • Oftentimes, these watering hole sites are infected with m_______ s_______
A

threat actor; website; group; users;
malicious software;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encouraging caution of social engineering may be done by:
- Staying a____
- Being c______
- Controlling c________

A

alert;
cautious;
curiosity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing kit tools
- M_________ attachments
- F___ data-collection forms
- F_________ web links

A

Malicious;
Fake;
Fraudulent;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Smishing

The use of t___ m_______ to obtain s_______ i_________ or to impersonate a known s______

A

text messages; sensitive information; source;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vishing

The exploitation of e_______ v_____ c__________ to obtain s______ i________ or i__________ a known source

A

electronic voice communication; sensitive information; impersonate;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing security measures
- A___-p______ policies
- E_______ t______ resources
- E____ filters
- I______ p_______ systems

A

Anti-phishing;
Employee training;
Email;
Intrusion prevention;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Angler phishing

  • A technique where a______ impersonate c______ s______ representatives on s_____ m____
A

attackers; customer service; social media;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Malware
1) V____
2) W___
3) T_____
4) R_________
5) S______

A

Virus;
Worm;
Trojan;
Ransomware;
Spyware;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus

Malicious c___ written to i______ with c________ o_________ and cause damage to d___ and s_______

A

code; interfere; computer operations; data; software;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Worm

  • Malware that can d________ and s_____ itself across s______ on its own.
A

duplicate; spread; systems;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Trojan

  • Malware that looks like a legitimate f___ or p______.
  • Attackers deliver this type of malware hidden in f___ and a__________ downloads
A

file; program;
file; application;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Adware

  • A type of l________ software that is sometimes used to display d_____ a__________ in a___________.
  • M________ adware falls into a sub-category of malware known as p_________ u_______ a__________ (PUA).
A

legitimate; digital advertisements; applications;
Malicious; potentially unwanted application;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Potentially Unwanted Application (PUA)

  • A type of unwanted s______ that is bundled in with l_________ programs which might display a__, cause device s_______, or i_____ other software.
  • Attackers sometimes hide this type of malware in f_______ with i_______ design to monetize ads for themselves instead of the developer.
A

software; legitimate; ads; slowdown; install;
freeware; insecure;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Spyware

Malware that is used to g_____ and s___ information without c______.
Also considered a _ _ _

A

gather; sell; consent;
PUA;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spyware is commonly hidden in b_________, additional software that is sometimes packaged with other a__________

A

bundleware; applications;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Scareware

  • Employs tactics to f_____ users into i__________ their own device.
  • Tricks users by displaying f___ w______ that appear to come from l________ companies
A

frighten; infecting;
fake warnings; legitimate;

25
Fileless malware - Uses l________ p______ that are already installed to i_____ a c_______. - This type of infection resides in m_______ where the malware never touches the h___ d_____
legitimate programs; infect; computer; memory; hard drive;
26
Fileless malware is detected by performing m_____ a______, which requires experience with o________ s_______
memory analysis; operating systems;
27
Rootkit - Malware that provides r_____, a__________ access to a c________. - Most attackers use rootkits to open a b_______ to systems, allowing them to install other forms of m______
remote, administrative; computer; backdoor; malware;
28
Dropper A type of m______ that comes packed with m_______ c___ which is d________ and i_______ onto a target system
malware; malicious code; delivered; installed;
29
Loader A type of malware that downloads strains of m_______ c____ from an e_______ s______ and installs them onto a t_____ system.
malicious code; external source; target;
30
Cryptojacking A form of m______ that installs s_______ to illegally mine c____________
malware; software; cryptocurrencies;
31
Signs of cryptojacking - S_______ - Increased _ _ _ usage - Sudden system c______ - Fast draining b_______ - Unusually high e___________ costs
Slowdown; CPU; crashes; batteries; electricity;
32
Actions taken to protect against cryptojacking - Using malware b______ b_____ extensions - Setting up m_________ p_______ for increased _ _ _ usage
blocking browser; monitoring processes; CPU;
33
Web-based exploits Malicious code or behaviour that's used to take a_________ of coding f____ in a web a_________
advantage; flaws; application;
34
Injection attack Malicious code inserted into a v________ a_________
vulnerable application;
35
Cross-site scripting (XSS) An injection attack that inserts c___ into a vulnerable w______ or w__ a__________
code; website; web application;
36
Types of cross-site scripting attacks 1) R_______ 2) S_____ 3) _ _ _ -based
Reflected; Stored; DOM;
37
Reflected XSS attack An instance when malicious s_____ is sent to a s_____ and activated during the s____'s response
script; server; server;
38
Stored XSS attack An instance when malicious s____ is injected d______ on the s______
script; directly; server;
39
DOM-based XSS attack An instance when malicious s_____ exists in the w______ a b_______ loads
script; webpage; browser;
40
SQL injection An attack that executes u_________ q_____ on a d________
unexpected queries; database;
41
Three categories of SQL injection: - I_-b___ - O__-o_-b___ - I_______
In-band; Out-of-band; Inferential;
42
In-band SQL injection - An in-band injection is one that uses the same c__________ c______ to launch the a_____ and gather the r______
communication channel; attack; results;
43
Out-of-band SQL injection - One that uses a different c__________ c______ to launch the a_____ and gather the r_______
communication channel; attack; results;
44
Inferential SQL Injection - Occurs when an attacker is unable to see the r______ of their a_____ - Instead, they can interpret the r______ by analyzing the b_______ of the s______
results; attack; results; behaviour; system;
45
Ways to escape user inputs: - P_______ s________ - I_____ s_________ - I_____ v________
Prepared statements; Input sanitization; Input validation;
46
Prepared statements A coding technique that executes _ _ _ statements before passing them on to a d________
SQL; database;
47
Input sanitization Programming that removes u___ i_____ which could be interpreted as c___
user input; code;
48
Input validation Programming that ensures user i____ meets a system's e__________
input; expectations;
49
Cross-site scripting (XSS) attacks are often delivered by exploiting the following languages: - J___S______ - _ _ _ _
JavaScript; HTML;
50
Two examples of when SQL injections can take place: - When a m_______ s_____ is injected directly on the s_____ - When a m_______ s_____ exists in the w_____ a b______ loads
malicious script; server; malicious script; webpage; browser;
51
In a SQL injection attack, malicious attackers attempt to obtain the following: - S_______ information - A___________ rights
Sensitive; Administrative;
52
Threat modeling The process of identifying a_____, their v__________, and how each is e_______ to t_____
asset; vulnerabilities; exposed; threats;
53
Attack tree A diagram that maps t______ to a_____
threats; assets;
54
Threat model steps 1) Define the s____ 2) Identify t______ 3) Characterize the e__________ 4) Analyze t______ 5) Mitigate r____ 6) Evaluate f_______
scope; threats; environment; threats; risks; findings;
55
PASTA stands for
Process for Attack Simulation and Threat Analysis
56
PASTA threat model framework (1-4) 1) Define b_______ and s______ objectives 2) Define the t______ scope 3) D_______ the application 4) Perform a t______ analysis
business; security; technical; Decompose; threat;
57
PASTA threat model framework (5-7) 5) Perform a v_________ analysis 6) Conduct attack m________ 7) Analyze r___ and i______
vulnerability; modeling; risk; impact;
58
STRIDE - A threat modeling framework developed by M_______. Helps identify vulnerabilities in 6 specific attack vectors: 1) S_______ 2) T_______ 3) R________ 4) I_________ d________ 5) D_____ of S_____ 6) E_________ of p_______
Spoofing; Tampering; Repudiation; Information disclosure; Denial; Service; Elevation; privilege;
59
The following are common signs that a computer is infected with cryptojacking software: - Sudden s______ c______ - Unusually high e___________ costs - Increased _ _ _ usage
system crashes; electricity; CPU;