Common Security Terminology
Mod 9.1 Security Concepts
Objective 4.1
CIA triad
- Confidentiality: means that certain information should only be known to certain people
DAD triad
- Disclosure
- Alteration
- Destruction
VTR (V+T=R)
- Vulnerability: weakness that could be accidentally triggered or intentionally exploited to cause a security breach
Security Audits and Assessments
Mod 9.1 Security Concepts
Objective 4.1
Risk Management: process for identifying, assessing, and mitigating vulnerabilities and threats to the essential functions that a business must perform to serve its customers
Posture Assessment: overall status of risk management is referred to as risk posture, shows which risk response options can be identified and prioritized
Process Assessment:
- MEF: Mission essential function - Business or organizational activity that is too critical to be deferred for anything more than a few hours, if at all
- BIA: Business impact analysis - Systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations
Regulatory Compliance
Mod 9.1 Security Concepts
Objective 4.1
Regulatory Compliance: imposes externally determined requirements on companies in certain industries or when processing certain types of data
Encryption
Mod 9.1 Security Concepts
Objective 4.1
Symmetric: keys same on both sides
Asymmetric: public and private keys
encryption algorithm: converts a human-readable plaintext into a ciphertext
cryptographic hash algorithm: converts a variable length string into a fixed-length hash, cannot be converted back to a plaintext
Data at rest: data is in some sort of persistent storage media
Data in transit: data is transmitted over a network
Data in use: data is present in volatile memory (RAM/CPU)
Attack Types
Mod 9.2 Network Threats and Attacks
Objective 4.2
Enumeration: An attack that aims to list resources on the network, host, or system as a whole to identify potential targets for further attack
- Footprinting: discover the topology and general configuration of the network and security systems, social engineering attacks, TCP/UDP application ports
- Fingerprinting: identify device and OS types and versions
Spoofing: Attack technique where the threat actor disguises his or her identity or impersonates another user or resource
DoS / DDoS: single/multiple physical, application, or network attack to manage resources
Vulnerability and Exploit Types
Mod 9.1 Security Concepts
Objective 4.1
Exploit: specific code or method of using a vulnerability to gain control of a system or damage it in some way
Zero-day: vulnerability that is exploited before the developer knows about it or can release a patch
Vulnerability assessment: evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system
Deception Technologies
Mod 9.1 Security Concepts
Objective 4.1
Honeypot: A host (honeypot), network (honeynet), file (honeyfile), or credential/token (honeytoken) set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration
Threat Types and Assessment
Mod 9.2 Network Threats and Attacks
Objective 4.2
External: threat actor or agent is one that has no account or authorized access to the target system
Internal: insider threat, has been granted permissions on the system
Threat Research: counterintelligence gathering effort in which security companies and researchers attempt to discover the tactics, techniques, and procedures (TTPs) of threat actors
Threat Types and Assessment
Mod 9.2 Network Threats and Attacks
Objective 4.2
Behavioral threat research: Narrative commentary describing examples of attacks and TTPs gathered through primary research sources
Reputational threat intelligence: Lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware
Threat data: Computer data that can correlate events observed on a customer’s own networks and logs with known TTP and threat actor indicators
Distributed DoS Attacks and Botnets
Mod 9.2 Network Threats and Attacks
Objective 4.2
reflection DoS (DRDoS): amplification attack, victim’s IP address and attempts to open connections with multiple servers
Botnets: group of compromised hosts that can be used to launch DDoS and DRDoS attacks
command and control (C2 or C&C): network established between the handlers and the bots
MAC Flooding Attack / VLAN Hopping Attacks
Mod 9.3 Spoofing Attacks
Objective 4.2
MAC Flooding: A variation of an ARP poisoning attack where a switch’s cache table is inundated with frames from random source MAC addresses
VLAN Hopping Attacks: send traffic to a VLAN other than the one the host system is in
Malware Attacks
Mod 9.2 Network Threats and Attacks
Objective 4.2
Malware: Software that serves a malicious purpose, typically installed without the user’s consent (or knowledge)
Shellcode: lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system
advanced persistent threat (APT): attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware
On-Path Attacks
Mod 9.3 Spoofing Attacks
Objective 4.2
On-Path: attack is a specific type of spoofing attack where a threat actor compromises the connection between two hosts and transparently intercepts and relays all communications between them
MAC/IP Spoofing
ARP Spoof/ Poisoning: broadcasting unsolicited ARP reply packets w/source address that spoofs a legitimate host or router interface
Rogue Devices and Services / Rogue DHCP
Mod 9.4 Rogue System Attacks
Objective 4.2
Rogue: device or service on your network isn’t under the administrative control of the network staff
Rogue DHCP
- deployed accidentally (forgetting to disable a DHCP server in an access point or router, for instance)
-rogue server to change the default gateway and/or DNS resolver addresses for the subnet and route communications via their machine On-path attack
DNS Attacks
Mod 9.4 Rogue System Attacks
Objective 4.2
DNS poisoning: injects false resource records into a client or server cache to redirect a domain name to an IP address of the attacker’s choosing
DNS-Based On-Path Attacks: ARP poisoning to respond to DNS queries from the victim with spoofed replies
DNS Client Cache Poisoning: attacker is able to place a false name IP address mapping in the HOSTS file and effectively poison the DNS cache, they will be able to redirect traffic
DNS Server Cache Poisoning: corrupt the records held by the DNS server itself
Social Engineering Attacks
Mod 9.5 Social Engineering
Objective 4.2
Phishing
Shoulder Surfing Attack
Tailgating and Piggybacking Attacks
Dumpster diving: organization’s (or individual’s) garbage to try to find useful documents/USB files
Password Attacks
Mod 9.5 Social Engineering
Objective 4.2
Passwords or password hashes can be captured by obtaining a password file or by sniffing the network
Stored in: Secure Hash Algorithm (SHA), Message Digest v5 (MD5) = fixed-length string from a variable-length string
Plaintext string
Dictionary: software matches the hash to those produced by ordinary words found in a dictionary (personal info)
Brute Force: software tries to match the hash against one of every possible combination it could be