Y12 Cybersecurity Flashcards

(52 cards)

1
Q

network threat

A

any potential malicious attack or unauthorised access to a computer network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

adware

A

malware that automatically delivers unwanted advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the Privacy Amendment (Notifiable Data Breaches) Act 2017

A

Network threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

external network threats

A

come from outside the organisation and include hackers, cybercriminals etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

social engineering (phishing)

A

Attackers send emails that create a sense of urgency and fear that appear to be from reputable sources (banks etc) which asks users to enter personal information on a fake website that looks identical Common indicators include suspicious sender addresses, grammar and spelling mistakes and unsolicited attachments or links Prevention tips include verifying the source, don’t click on suspicious links and use multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

denial of service, including distributed denial of service

A

DoS Aimed at disrupting normal functions of a targeted system, service or network by overwhelming the target with a flood of internet traffic Works by sending more requests from one computer to a system than it can handle, crashing the system Impact includes service interruptions, financial losses and reputational damage Mitigation strategies include network configuration, redundancy and monitoring and responding

DDoS Multiple compromised systems are used to attack a single system Types include volume based (utilises high traffic to overwhelm network bandwidth) and protocol (exploits server resources and network equipment) Impact includes severe disruption of networks, expensive to mitigate and used as a smokescreen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

back door

A

Secret pathway hackers use to access a system, bypassing normal security mechanisms Created by developers intentionally installing them for maintenance and troubleshooting purposes and created by attackers by infecting the system with malware Some risks include regular software updates, comprehensive security and network monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP spoofing

A

Attackers disguise their IP addresses by forging header packets, making it appear that the packet is coming from different sources Works by altering the source IP address to trick the receiving system and the attacker masks their location and identify, making it difficult for victim to trace the source of the attack Prevention and mitigation techniques include packet filtering, encryption and authentication & network security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL Injection

A

Exploits vulnerabilities in SQL, allowing attacker to execute malicious SQL statements that can control web app database servers Works by attackers taking advantage of improper coding and ‘injecting’ malicious code Includes modifying data, retrieving sensitive information and deleting and manipulating database contents Impact of SQL injections are data breaches, loss of data integrity and system compromise To prevent, input validation, use prepared statements and regular security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

man-in-the-middle

A

Attacker inserts themselves into a conversation that should be private, and once inserted, attacker can eavesdrop on the conversation and/or alter the information being sent between them Impact include data breaches, loss of trust and financial fraud To prevent, encryption, secure connections and authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cross-site scripting

A

Attackers place malicious scripts into the content of a webpage and when user loads affected page, malicious script executes, which leads to unauthorised access, data theft or harmful actions Stored – malicious script is permanently stored Reflected – script is reflected off the web server that displays an error message DOM (document object model)-based – vulnerability is in client-side code rather than server-side code and arises when web application’s client-side script writes data the user provides to DOM Impact includes data theft, vandalism and phishing Prevention tips include sanitising input, content security policy and using secure frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

types of malware

6 things

A

Adware – malware automatically delivers unwanted advertisements
Ransomware – type of malware that blocks access to computer systems
Spyware – malware that secretly records user actions so cybercriminals can use it
Trojan horse – malware that disguises itself as legitimate software
Virus – malware that attaches itself to clean files and infect other clean files
Worms – malware that replicates itself to spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

zero day vulnerabilities

A

Security flaw in software not known to those interested in mitigating vulnerability Stages Vulnerability – found by an individual who keeps it secret Exploit – knowledge of vulnerability used to develop ‘exploit code’ Attack – exploit is used to perform one or more attacks on vulnerable system Day zero – day vendor learns of vulnerability and begins fixit it Prevention strategies include threat intelligence sharing, use of advance technologies and regular security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

physical network threats

A

Any form of physical manipulation of networking hardware Includes unauthorised access to data centres, server rooms and networked devices Types include theft of equipment, vandalism, natural disasters and power failure Prevention and mitigation – physical security controls, environmental controls and data backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

lost or stolen devices

A

Devices that contain sensitive data that can be stolen and used Consequences include data breaches, financial impact and reputation damage Prevention measures are device encryption, remote wipe capabilities and user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

compromised credentials

A

Unauthorised access obtained through stolen or weak user credentials, allowing attackers to bypass security measures and gain access Impact is data exposure, operational disruption and reputation damage Prevention strategies are strong password policies, MFA and regular credential updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

misuse by employees

A

Any improper, unethical or unauthorised use of companies resources Impact is security breaches, legal and compliance issues and loss of reputation Prevention includes clear policies and procedures, regular training and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

analysis of log files

A

Record of anything happening in a system
Purpose is record keeping (record all actions on a network), monitoring (monitors network performance and detects anomalies) and compliance (most frameworks require organisations to use log files to ensure compliance with security standards
You analyse log files by collecting logs, centralise logging (SIEM – security information and event management – to correlate log data), log review tools, regular review to detect unusual patters, automated alerts. Suspicious activities, unusual login attempts, unauthorised access, malware indicators, system errors and looking for anomalous behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

anti-malware software

A

Software designed to protect systems from malware
Anti-virus programs – software designed to detect and remove viruses Anti-spyware programs – detect and remove spyware
Endpoint protection – security solution that protects all endpoints Network security solutions – tools protect entire network from malware Best practices include regular updates, scheduled scans, user education and email filtering etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

firewall filtering

A

Function is traffic control, security barrier, policy enforcement and logging Types include packet filtering, stateful inspection, application layer and proxy firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

access control lists

A

Set of rules that control incoming and outgoing network traffic
Filter traffic based on criteria, like IP addresses, protocols and port numbers
Enhance network security by traffic filtering, segmentation, control and monitoring

22
Q

intrusion prevention systems

A

Monitors network traffic to detect and prevent malicious activity by actively blocking and mitigating threats, taking immediate action Best practices include regular security updates, tuning and optimisation and updates
INTRUSION DETECTION SYSTEMS Monitors network traffic for suspicious activities Acts as surveillance system, providing notification without intervening

23
Q

virtual private networks

A

Technology that creates a secure, encrypted connection over a less secure connection/network, like the internet
Purpose is a secure connection, and privacy, with types as remote access and site-to-site VPNS

24
Q

user training

A

First line of defence – educated users can recognise and prevent breaches
Key topics included are recognising phishing attacks, password management, safe internet and email usage, data protection, secure and incident reporting

25
ICT code of conduct
Outlines guidelines and best practices for ethical and secure use of technology Key elements: 1. User responsibility and awareness – clear guidelines on acceptable use of resources and regular training sessions 2. Data protection and privacy – policies for handling sensitive data 3. Incident reporting 4. Access control – principle of least privilege Benefits include enhanced security awareness, improved incident response, strengthened data protection and regulatory compliance
26
physical security
Protecting hardware, software or networks from physical actions and events that could cause serious loss or damage Access control, surveillance, environmental controls, secure infrastructure Benefits are enhanced protection, improved incident response, mitigation of environmental threats, increased trust and compliance
27
appropriate solutions to different external network threats
Identifying network threats – network monitoring, log analysis, threat intelligence, vulnerability scanning Step by step mitigation strategies Identification – detect threat and determine type and severity Containment – isolate affected systems and block malicious traffic Eradication – remove threat and clean up system Recovery – restore systems and verify severity Post-incident analysis – review incident and improve security Cryptography Preventing information from unauthorised access, modification, disclosure and destruction Ensures confidentiality, integrity and availability of information
28
symmetric encryption
Uses a single key (random string of bits) for both encryption and decryption Example, Alice sends a message to Bob (‘Hello Bob’), they agree on key 12345, so ‘H’ becomes ‘I’, ‘E’ becomes ‘G’ etc. until they get the final message as ‘IGOPG, CQE’ and if Eve tries to intercept the message, she can’t decipher it without the key Advantages include speed and bulk data encryption, limited resources and high-speed communication channels
29
asymmetric encryption (public/private keys)
Everyone has 2 keys, public (distribute openly) and private (kept confidential), that are connected Example, Alice wants to send message to Bob, she uses Bob’s public key to encrypt, when Bob receives the message, he uses his private key and only he can decrypt the message Advantage is it doesn’t require people to exchange a common key
30
certificate purpose and use
Digital certificates - Electronic files that authenticate the identity of websites, individuals and organisations of devices - Uses public and private keys to encrypt and decrypt messages Digital signatures - Cryptographic technique to verify authenticity and integrity of digital documents and messages - Like certificates, uses public and private keys - When signing a document digitally, you are encrypting a hash of document with your private key, creates a digital signature that can be verified using public key, which is stored in digital certificate - Start with original document Has function – creates verification value with numbers & letters - Encrypts hash using senders private key which creates the digital signature
31
prevent unauthorised access to data
Ensures only authorised individuals have access to data through key management and a private key required to keep seceret
32
authenticate data being sent across network
Digital signatures & certificates
33
common methods of encryption:
Substitution ciphers Transposition ciphers Rotor machines
34
current best practice of encryption
Key length and complexity Key management Algorithm agility Multi-factor encryption Ethical hacking
35
role of ethical hacking in improving network security
Legally breaking into computers and devices to test an organisations defence and identify vulnerabilities to improve security Characteristics include it is legal and authorised, proactive approach and comprehensive testing Techniques Reconnaissance – gathering information about target system Scanning – use tools to find open ports, services and vulnerabilities Exploitation – attempting to exploit identified vulnerabilities to gain unauthorised access Post-exploitation – assessing impact of the exploit and gathering information which could be used in actual attack Report – document findings and provide recommendations for remediation Benefits include enhanced security posture, compliance, risk management and continuous improvement
36
phishing
attackers deceive people into providing sensitive personal information by masquerading as trustworthy entities
37
ransomware
blocks access to computer systems
38
spyware
secretly records user actions so cybercriminals can use it
39
trojan horse
disguises itself as legitimate software
40
virus
attaches itself to clean files and infects other clean files
41
worms
replicates itself to spread to other computers
42
cryptography
prevents information from unauthorised access, modification, disclosure and destruction. ensures confidentiality, integrity and availability of information. converts messages into random characters that cannot be intercepted without a specific key
43
penetration testing
conducting simulated cyberattack on a computer system Goal is to evaluate systems’ security by identifying vulnerabilities, fixing them and improving security posture
44
black box tesing
- Doesn’t know system and approaches system as an outsider, mimicking external attacker - Provides unbiased view, identifying vulnerabilities that could be exploited by anyone
45
white box testing
- Complete access to systems architecture, code and documentation, simulating an internal hacker - Identifies vulnerabilities that may not be evident
46
grey box testing
- Tester has some knowledge, combines elements of black and white box testers
47
red team vs blue team
- Red team acts as ‘attackers’, simulating real world cyberattacks to identify vulnerabilities and weaknesses - Goal is to penetrate network, bypass security controls and demonstrate impact of potential breaches - Blue team is responsible for defending the network, monitors the network for suspicious activities, implement security controls and respond to incidents - Objective of red and blue teams is to improve security posture, realistic testing, collaboration and improvement and continuous learning
48
phases of pen testing
1. Planning and reconnaissance 2. Scanning 3. Gaining access 4. Maintaining access 5. Analysis and reporting
49
Importance of adhering to ethical principles
- Foundation trust between technology providers and users - Professional responsibility - Preventing harm, like data breaches, identity theft etc.
50
Responsible use of technology and data
- Data privacy and security, compliance with laws, transparency and accountability and ethical decision making
51
privacy act 1988
- Aims to safeguard individuals’ privacy by regulating how personal information is collected, used, disclosed and stored - Sets out standards and principles organisations must follow - APP 11 o Mandates organisations take reasonable steps to protect personal information o Implement robust security measures, like encryption, secure access controls o Organisations must prevent improper use of any personal information
52
notifiable data breach
- Mandatory data breach notification in Australia - Aims to protect individuals from information them about data breaches that could affect them - Organisations must collaborate with Office of Australian Information Commissioner (OAIC) in the data breach notification process