CySec Foundations Teil 2
CySec Foundations Teil 2
CySec Foundations Teil 2
Fichier Détails
Cartes-fiches | 210 |
---|---|
Langue | Deutsch |
Catégorie | Informatique |
Niveau | Université |
Crée / Actualisé | 31.07.2020 / 10.08.2020 |
Lien de web |
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
|
Intégrer |
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Steps of the NIST Cyber Security Framework?
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
What is technical vulnerability management?
a security practise designed to proactively mitigate or prevent the exploitation of vulnerabilities
Which 4 things does the process of technical vulnerability management involve?
1. Identification
2. classification
3. remediation
4. mitigation
of vulnerabilities
What is a security event?
occurrence to have potential security implications
What is a security incident?
occurrence that actually or potentially jeopradizes confidentiality, integrity or availability of information
Sources of security events
- OS logs
- applications logs
- security tool logs
- outbound proxy logs
What does APT stand for?
Advanced Persistent Threat
What is an Advanced Persistent Threat (APT)?
network attack in which unauthorized personell gains access to a network and stays there, undetected for a long time
intention is to steal data
often targets orgs in high-value information sectors
Which 7 phases does the 'Cyber Attack Kill Chain' include?
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploit
5. Installation
6. Command and Control
7. Actions
What does AAA stand for?
Authentication
Authorization
Accounting
What are the 7 authentication scheme classifications?
1. Basic Authentication
2. One Time Passwords
3. Challenge / Response
4. Anonymous Key Exchange
5. Zero-Knowledge Password Proofs
6. Server certificates plus user authentication
7. Mutual Public Key Authentication
What does MIME stand for?
Multipurpose Internet Mail Extension
What does SPF stand for?
Sender Policy Framework
What does DKIM stand for?
Domain Keys Identified Mail
What is the Sender Policy Framework?
SPF records are TXT records in DNS
a mailserver may check for a SPF records
Name the OWASP Top 10
A1: Injection
A2: Broken Authentication
A3: Sensitive Data Exposure
A4: XML External Entities
A5: Broken Access Control
A6: Security Misconfiguration
A7: Cross-Site Scripting
A8: Insecure Deserialization
A9: Using Components with known vulnerabilites
A10: Insufficient Logging & Monitoring
How do you protect a system against SQL Injection?
- Input validation
- Prepared statements -> no dynamic SQL
Give an example for A3: Sensitive Data Exposure
an input given by a user results in an error and said input is logged. e.g. credit card data
Name the 3 types of XSS
- Stored
- Reflected
- DOM-based
Name the hacker types
- Black Hat
- Grey Hat
- White Hat
- Script Kiddie
- Cyber Terrorist
- State Sponsored
What is the difference between a Script Kiddie and other hacker types?
A script kiddie may not understand what the tools they are using are doing
What is a zero day attack?
- exploits zero-day vulnerabilities
- zero-day exploit is not known to the software vendor
What are the two main functions of viruses?
propagation and destruction
What is virus propagation?
defines how a virus will spread from system to system
Name 4 virus propagation techniques
- master boot record infection
- file infection
- macro infection
- service injection
How does MBR infection work?
virus attacks the portion of the bootable media
1. system reads infected MBR
2. virus instructs it to read and execute the code stored in alternate location
3. system loads entire virus into memory
How does file infection work?
virus infects executable files
How does service injection work?
virus injects itself into trusted runtime processes
e.g. svchost, winlogin, explorer.exe
How does macro infection work?
virus is written in a macro language
macros are executed upon opening of the document
What is a multiparte virus?
virus uses more than one propagation technique
what are stealth viruses?
viruses hide themselves an lead AV software to believe that everything is normal.
e.g. virus might overwrite MBR and modify OS file system functionality
upon checking the MBR, virus will provide it with clean version of MBR to stay hidden
What are polymorphic viruses?
viruses that modify their own code in order not have the same signature
What are encrypted viruses?
- use cryptographic techniques to avoid detection
- use very short segment of code to decrypt: the decryption routine
- each infection has different key, causing them to look different on different machines
What are logic bombs?
- viruses that lie dormat until triggered by a certain event (e.g. program launch, website logon)
What are trojan horses?
- program that appears kind, but has malicious behind the scenes payload
- e.g. rouge AV
What is keystroke logging?
- the action of recording key strikes on a keyboard
- data can then be retrieved by actor thats controlling the program
What is ransomware?
- infects target machine, encrypts files
- user has to pay to receive decryption key
What is special about worms?
They replicate without human intervention
What is Stuxnet?
A worm which targeted the iranian nuclear program
How did Stuxnet replicate?
- unprotected administrative shared
- zero day vulnerabilities in windows server service an print spooler service
- databases with default password
- infected USB drives