Premium Partner

Cybersecurity Foundations

Cybersecurity Foundations HSR Vorlesung 1-5 PART 2: https://card2brain.ch/box/20200731_cysec_foundations_teil_2

Cybersecurity Foundations HSR Vorlesung 1-5 PART 2: https://card2brain.ch/box/20200731_cysec_foundations_teil_2


Set of flashcards Details

Flashcards 61
Language English
Category Computer Science
Level University
Created / Updated 31.07.2020 / 18.04.2021
Licencing Not defined
Weblink
https://card2brain.ch/box/20200731_cybersecurity_foundations
Embed
<iframe src="https://card2brain.ch/box/20200731_cybersecurity_foundations/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

How does a DNS zone transfer attack work and why can it be harmfull

A DNS Zone transfer is a process where one DNS server copys parts of its databse to another DNS. This helps to have more than one server which can answer questions about a zone. The slaves ask for a copy by the master.

A DNS Zone transfer attack, is that you pretend to be a slave an get a copy of the DNS zone records. 

Risk: The zone records, show a lot of internal topology information about the network, if someone wants to subvert (untergraben) the DNS with spoofing (falsche Identität verwenden) and poisoning, this is very helpful.

What is Red Team in the context of Cybersecurity

Offensive Cybersecurity, focus on penetration testing, assume the role of a hacker, show organizations what could be backdoors or exploits, common practice is that they are outside of the organization.

What is Blue Team in the context of Cybersecurity

Defensive Cybersecurity, Assessment (Bewertung) of network security, identification of possible vulnerabilities, find ways to defend, change and re-group defence mechanisms to make incidents responses much stronger. They are continuously improving the digital security infrastructure using security audits, log and memory analysis, pcap, risk intelligence data

Whats the idea behind risk management?

Reduce risk and support the mission of the organization.

  • It is impossible to design a risk-free environment
  • Significant risk reduction is possible often with little effort

Process:

  • Identifying factors that could damage or disclose data
  • Evaluating those factors in light of data value and countermeasure (Gegenmassnahme) cost
  • Implementing cost-effective solutions for mitigating(mildern) or reducing risks

Whats part of a risk analysis?

  • Evaluation, assessment, and the assignment of value for all assets of an organization
  • Examining (untersuchen) an environment for risks
  • Evaluating each threat event as to its likelihood of occurring and the cost of damage it would cause if it did occur
  • Assessing (bewerten) the cost of various countermeasures for each risk and creating a cost benefit report for safeguards to present upper management

Whats Risk mitigation?

reducing risk, implementation of safeguards and countermeasures to eliminate vulnerabilities

Whats Risk assignment

moving risk to another entity or organization

Whats Risk acceptance

risk tolerance, cost/benefit analysis shows that countermeasure costs too much