what is cybersecurity?
practice of protecting an organization’s IT infrastructure and critical data from bad actors by deploying technologies, internal control processes, and best practices
what are the 4 highest security concerns of those charged with IT governance?
breaches of data
theft of data
service interruptions
regulatory noncompliance
what are 4 examples of data breaches?
ransomware
phishing
malware
compromised passwords
what is a service disruption?
unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time
what are 4 examples of service disruptions?
malware
distributed denial of service (DDoS) attacks
SQL injections
password attacks
what 2 things should organizations do to combat cybersecurity threats?
1) discuss various programs to mitigate risks
2) constantly update security measures
what is a cyberattack?
any kind of malicious activity that:
- targets computer information systems
- attempts to collect, disrupt, deny, destroy, etc. information systems
what are the 6 methods a cybersecurity attack can be grouped into?
network based attacks
host based attacks
social engineering attacks
application based attacks
physical attacks
supply chain attacks
what is a threat agent?
an internal or external attacker that could negatively impact data security
what are 6 examples of threat agents?
what are the 12 types of network based attacks?
backdoors and trapdoors
covert channels
buffer overflows
denial of service (DoS)
distributed denial of service (DDoS) attacks
man in the middle (MITM) attacks
port scanning
ransomware
reverse shell
replay attacks
return oriented
spoofing
what is a covert channel?
mechanism used to transmit data using methods not originally intended for data transmission
what are 2 types of covert channels?
storage channels
timing channels
what is a storage channel?
data is transmitted to a storage location allowing another party with lower security permission to access the data
what is a timing channel?
use the delay (or gaps) in transmitting data packets to hide the transmission of data
what is a buffer overflow?
attacker overloads a program’s buffer (temporary storage) with more input than it is designed to hold
what is a DoS attack?
attacker floods a system’s network by congesting it with large volumes of traffic that is greater than the bandwidth it was designed to handle
what is a DDoS attack?
multiple attackers are working in unison to flood an organization’s network with traffic
what is the difference between DoS and DDoS attack?
DDoS requires MULTIPLE attackers and coordination amongst them
what is a MITM attack?
attacker acts as an intermediary between two parties intercepting communications
what is a port scanning attack?
attackers scan networks for open ports to find vulnerabilities to gain unauthorized access to a network
what is a reverse shell attack?
aka as inside out attack or connect-back shells
victim initiates communication with an attacker from behind a company’s firewall so that the attacker can bypass the firewall to remotely control the victim’s machine
what is a replay attack?
type of MITM attack in which a cybercriminal eavesdrops on a secure network communication, intercepts it, and then “replays” the message at a later time to the intended target to gain access to the network
what is a return oriented attack?
sophisticated technique that utilizes pieces of legitimate original system code (each a gadget) in a sequence to perform operations useful to the attacker