Describe Trade Secrets and how they are used
Whats a Patent and is it usable for software
What are assets of an organization
What could happen if an asset is lossed or disclouserd
waht are the military and business data classifications
Military :
The unauthorized disclosure of top-secret data will have drastic effects and cause grave damage to national security. The unauthorized disclosure of data classified as secret will have significant effects and cause critical damage to national security. The unauthorized disclosure of data classified as confidential will have noticeable effects and cause serious damage to national security. Sensitive but unclassified is used for data that is for internal use.
Business:
What is SSH, why is it used and what are the advantages compared to older technologies as e.g. ftp, telnet, rlogin ...
Secure Shell replaces unsecure remote configuration operations as e.g.: telnet, ftp, rlogin, rsh, rcp and rexec. Old commands and protocols transmit the content in plain text rather than encrypted format.
Advantages: encrypts data, offers different authentication methods e.g. password authentication, Pubkey Authentication
What is suspicious behaviour of a process?
process running with open network socket, that doesn’t show up on a similar system, network saturation (Ausnutzung) from a single host but nothing in the file system, programm eating up 100% CPU power but nothing in the file system
What is a reverse shell and a bind shell how do they work together and what can happen?
Bind Shell: Attacker connects to a victim on a listening port
Reverse Shell: Victim connects to attacker on listening port
Can be done with netcat, which then allows to transfer files