CYSE 101 FINAL

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the difference between a stateful packet filtering firewall and a basic packet filtering firewall? A stateful packet filtering firewall tracks sessions between systems A basic packet filtering firewall inspects all bytes in every packet A stateful packet filtering firewall does not track sessions between systems A basic packet filtering firewall tracks sessions between systems

A stateful packet filtering firewall tracks sessions between systems

What is competitive counterintelligence? Actions to spy on your competition Actions to defeat competitive intelligence activities Actions your competition uses to spy on you

Actions to defeat competitive intelligence activities

Case Study: Automobile Hacking (video)

Basically, exploited through injection or modification of messages -> physically able to access the car's features

Which of the following is not part of operating system hardening? Making alterations to common accounts Applying software updates in a timely manner Changing the main network firewall ruleset Applying the principle of least privilege Making use of logging and auditing functions Removing or turning off unessential services Removing unnecessary software

Changing the main network firewall ruleset

Name the two main categories of Web security. Buffer overflows and SQL injection Client-side attacks and server-side attacks Denial of Service (DoS) and Distributed Denial of Service (DDoS) Race conditions and input validation

Client-side attacks and server-side attacks

Case Study: RQ-170 Sentinel (UAV)

How Exploited: UAV's (Unmanned Aerial Vehicles) blocked communication Vulnerabilities: - insecure communication - untrusted navigation - unencrypted data - exposed designs and tech Threat: Nation States Controls: mainly Cryptography and Physical Security (encryption)

Case Study: Hainan Island Incident

How Exploited: physical access to systems; not all encrypted (and keys present for some) Impacts: MAINLY CONFIDENTIALITY (exposure of data, code, and designs); possibly integrity and availability Vulnerabilities: - unencrypted data at rest and in process Threat: Nation States Controls: mainly Cryptography and Physical Security (encryption)

Case Study: Stuxnet

How Exploited: Centrifuge failures at Iran nuclear plant due to virus discovered in USB Impact: Integrity and Availability Vulnerabilities: - external media (what's allowed in) - code integrity - weak internal security Threats: Hackers for hire, nation states, hactivists, terrorists, insiders Controls: (most controls apply) - no media allowed in/out - file integrity checkers - disable services/ports

Case Study: Ukraine Power Grid

How Exploited: phish led to IT network access, compromised workstations Vulnerabilities: - weak antimalware - weak human antiphishing - 1 factor authentication Threats: Hackers for hire, nation states, hactivists, terrorists, insiders, other Controls: Most controls apply

What is the third law of operations security? If you are not protecting it (the information), . . . DON'T WORRY, SOMEONE ELSE WILL! If you are not protecting it (the information), . . . THE DRAGON WINS! If you are not protecting it (the information), . . . POLISH YOUR RESUME! If you are not protecting it (the information), . . . YOU ARE OK!

If you are not protecting it (the information), . . . THE DRAGON WINS!

Which of the following is not a reason why clicking on a shortened URL from a service such as bit.ly be dangerous? The user doesn't know the real URL The real URL might be malicious It is easier than typing the long URL

It is easier than typing the long URL

When we have cycled through the entire operations security process, are we finished? No, we continue to iterated through the steps Yes, after one cycle we are done

No, we continue to iterated through the steps

What does the European Union s (EU) Data Protection Directive (Directive 95/46/EC) deal with? AES PII XKCD RSA PGP

PII

What does PII stand for? Privacy, Identify, and Integrity Protocol Independent Identity Protocol Independent Integrity Personally Identifiable Information

Personally Identifiable Information

What is the purpose of a network DMZ? Encrypt the traffic to and from sensitive systems Provide external access to systems that need to be exposed to external networks such as the Internet in order to function Encrypt the hard drives of sensitive systems Isolate systems so that they cannot be reached from external networks such as the Internet

Provide external access to systems that need to be exposed to external networks such as the Internet in order to function

What does a fuzzing tool do? Decrypts strongly encrypted content Provide multiple data and inputs to discover vulnerabilities Decrypts poorly encrypted content Guesses a password to gain system access

Provide multiple data and inputs to discover vulnerabilities

The term operations security and the acronym OPSEC were coined by what Vietnam War-era study? Red Dragon Operation Barbarossa Purple Dragon The Tet Offensive

Purple Dragon

What is the quantitative formula for risk presented in class? RISK = P(impact) * P(E|V,T) RISK = P(V,T|E) * Impact RISK = P(V|T) * Impact RISK = P(E|V,T) * Impact

RISK = P(E|V,T) * Impact

What is residual data and why is it a concern when protecting the security of our data? Residual data is data that is encrypted after it has been used, thus alleviating any concerns Residual data is data stolen from a breached database; the data may later be made public Residual data is data that remains after it has been used; not erasing or destroying it may be exposing data that we would not normally want made public Residual data is data that is destroyed after it has been used, thus alleviating any concerns

Residual data is data that remains after it has been used; not erasing or destroying it may be exposing data that we would not normally want made public

At a high level, what does the Federal Privacy Act of 1974 do? Provides for the electronic surveillance of US citizens without a warrant Proposes security standards as a condition of processing credit card transactions Safeguards privacy through creating four rights in personal data Provides algorithms for the strong encryption of data

Safeguards privacy through creating four rights in personal data

What does the tool Nikto do? Guesses a password to gain system access Decrypts poorly encrypted content Decrypts strongly encrypted content Scans a web server for common vulnerabilities

Scans a web server for common vulnerabilities

What is a key difference between signature and anomaly detection in IDSs? Signature detection uses fingerprints or distinct patterns of attacks to detect intrusions; anomaly detection uses deviation from baseline activity to detect instructions Signature detection uses software behaviors to detect intrusions; anomaly detection uses deviation from baseline activity to detect instructions Anomaly detection uses fingerprints or distinct patterns of attacks to detect intrusions; signature detection uses deviation from baseline activity to detect instructions Anomaly detection uses code genealogy (derived code) to detect instructions; signature detection uses fingerprints or distinct patterns of attacks to detect intrusions

Signature detection uses fingerprints or distinct patterns of attacks to detect intrusions; anomaly detection uses deviation from baseline activity to detect instructions

Why is it important to use strong passwords? A strong password can be safely shared across multiple sites Weak passwords are just as good as strong ones Strong passwords are easier to remember Strong passwords are harder (take longer) to brute force

Strong passwords are harder (take longer) to brute force

When considering possible risk mitigation actions, which relationship between risk reduction and cost of the action would cause us to recommend the action? The relationship between reduction in risk and cost of the action is not relevant The reduction in risk is less than the cost of the action The reduction in risk is greater than the cost of the action

The reduction in risk is greater than the cost of the action

Why is it important from a security perspective to remove extraneous files from a Web server? They may be misunderstood by legitimate users or customers They may provide information or vulnerabilities useful to an attacker They take up memory They take up disk space

They may provide information or vulnerabilities useful to an attacker

Which of the following is an example of a race condition? Two bank transactions (withdrawals) run concurrently and the balances are not properly accumulated (recorded) A malicious user leaves a trojan horse program for a later user to execute Two bank transactions (withdrawals) run sequentially and the balances are not properly accumulated (recorded) An attacker sends high volumes of network traffic to overwhelm a target

Two bank transactions (withdrawals) run concurrently and the balances are not properly accumulated (recorded)

What is pretexting? Using a fake identity and creating a believable scenario for malicious purposes Texting a remote site before connecting to it over a network Send text message before sunrise Inserting hidden text before the start of a message

Using a fake identity and creating a believable scenario for malicious purposes

How does an XSRF attack works? a link or script on one web page is executed in the context of another open web page or web application a buffer overflow on one site is executed by a remote user on a another site a link or script on one web page is executed in the context of that same web page a user's credentials compromised in one attack are used to log in to another target

a link or script on one web page is executed in the context of another open web page or web application

Which of the following would not be a type of physical access control might we put in place in order to block access to a vehicle? fences concrete barriers security landscaping cameras

cameras

What is the primary purpose of a network firewall? control the traffic allowed in and out of a network encrypt network traffic allow connections to any internal system IP address allow connections to any internal system port number

control the traffic allowed in and out of a network

Does an SQL injection attack compromise content in the database or content in the Web application? web application neither database both

database

What is the primary purpose of a Network Intrusion Detection System? encrypt network traffic detect possible attack traffic block malicious network traffic attack (hack back) against the source of malicious traffic

detect possible attack traffic

Exploit frameworks make it... harder to recognize possible attacks on the network harder to amateurs to launch cyber attacks easier for amateurs to launch cyber attacks

easier for amateurs to launch cyber attacks

Which of the following is *not* a physical control that constitutes a deterrent? signs in public places that indicate that video monitoring is in place encryption dogs fences regulations policies yard signs with alarm company logos that we might find in residential areas guards locks well-lit areas

encryption

Which of the following is *not* a types or categories of control we use for physical security? detective measures deterrent measures evidence measures preventive measures

evidence measures

What does applying a vendor OS update (patch) usually do? creates vulnerabilities in the OS code exploits a vulnerability in the OS code fixes vulnerabilities in the OS code detects a vulnerability in the OS code

fixes vulnerabilities in the OS code

Did the formal OPSEC methodology emerge from the government/military or commercial/industrial sectors? government/military commercial/industry

government/military

What does California's SB 1386 deal with? handling unauthorized exposure of data relating to all US residents how US federal agencies can share an individual s data with other people and agencies handling unauthorized exposure of data relating to California residents requirements to show an individual any records kept on him or her

handling unauthorized exposure of data relating to California residents

Why might we want a (software) firewall (FW) on our host if one already exists on the network? host FWs know more about the local system host FWs see more network-wide traffic than network FWs host FWs provide no advantage over network FWs host FWs know less about the local system

host FWs know more about the local system

How can we prevent buffer overflows in our applications? implement proper bounds checking use strong passwords only run programs on Linux add network capacity

implement proper bounds checking

Why might we want to use information classification? it makes the task of identifying our critical information considerably easier it creates extra paperwork and bureaucracy it makes the task of identifying our critical information considerably harder it helps confuse the adversary

it makes the task of identifying our critical information considerably easier

Which of the following is not a provision of the Federal Privacy Act of 1974? it requires agencies to follow certain principles, called fair information practices, when gathering and handling personal data it places restrictions on how agencies can share an individual s data with other people and agencies it requires government agencies to show an individual any records kept on him or her it provides individuals the "right to be removed from the Internet" it lets individuals sue the government for violating its provisions

it provides individuals the "right to be removed from the Internet"

Which of the following is not a protocol for wireless encryption? WPA kismet WEP WPA2

kismet

Why might extradition be a delicate issue when prosecuting computer crimes? lack of a consistent set of laws regarding extradition currency exchange rates lack of a common world-wide operating system a consistent set of laws regarding computer crime means you can prosecute anywhere

lack of a consistent set of laws regarding extradition

Why does network segmentation generally improve security? traffic on each isolated segment is faster different people are in charge of different networks network segmentation does not generally improve security malicious traffic cannot freely traverse the internal network

malicious traffic cannot freely traverse the internal network

From a security perspective, why might we not want to allow personal equipment to be attached to the network of our organization? lost work hours malware and intellectual property issues inequity among employees electricity cost

malware and intellectual property issues

Which category of physical control listed would not include a lock? deterrent preventive detective mimicry

mimicry

What tool mentioned in the text might we use to scan for devices on a network, to include fingerprinting the operating system and detecting versions of services on open ports? honeypots nmap wireshark WPA2

nmap

Is it OK to use the same password for all of our accounts? yes because sites use SSL/TLS to secure the communication yes because using different passwords is hard to remember yes as long as the password is strong no because a compromise of one account leads to a compromise of all accounts using the same password

no because a compromise of one account leads to a compromise of all accounts using the same password

How does a spear phishing attack differ from a general phishing attack? number of targets and custom messages size of the message whether message has embedded javascript or not whether message has malware attached or not

number of targets and custom messages

Name the three major priorities for physical security, in order of importance. equipment, data, people people, data, equipment data, people, equipment people, equipment, data

people, data, equipment

What is the difference between a port scanner and a vulnerability assessment tool? port scanners close listening ports; vulnerability assessment tools open listening ports port scanners discover listening ports; vulnerability assessment tools report known vulnerabilities on listening ports vulnerability assessment tools close listening ports; port scanners open listening ports vulnerability assessment tools discover listening ports; port scanners report known vulnerabilities on listening ports

port scanners discover listening ports; vulnerability assessment tools report known vulnerabilities on listening ports

How does the principle of least privilege apply to operating system hardening? allows attack actions that require administrator or root privilege prevents attacks by blocking known malicious code from executing prevents attacks by blocking code execution on the memory stack prevents attack actions that require administrator or root privilege

prevents attack actions that require administrator or root privilege

What does executable space protection do for us and how? prevents virus attacks from working by detecting specific byte strings in the code prevents buffer overflow attacks from working by allowing code execution on the memory stack prevents virus attacks from working by preventing an application from running prevents buffer overflow attacks from working by blocking code execution on the memory stack

prevents buffer overflow attacks from working by blocking code execution on the memory stack

What is the foremost concern as related to physical security? protect profits protect people protect equipment protect data

protect people

Which of the following is not something we can do to more effectively reach users in our security awareness and training efforts? posters offer repeated and varied avenues for communication gamification randomly fire employees regardless of their actions make the training more interesting and produce positive results

randomly fire employees regardless of their actions

Which of the following is not a reason to use a honeypot? alert us to an attacker's presence release classified or PII data detect, monitor, and sometimes tamper with the activities of an attacker attract the attention of attackers in order to study them and their tools

release classified or PII data

According to the text, which of the following is not a security professional's obligation relating to information protection and unauthorized disclosure? release test data to see where it shows up be able to catalog and categorize what information was taken if there is a leak prevent information from unauthorized release

release test data to see where it shows up

What is one of the best steps we can take to protect people? require two factor authentication give them oxygen masks lock all doors from the outside remove them from the dangerous situation

remove them from the dangerous situation

What did the PCI DSS establish? maximum dollar values for electronic financial transactions protocols for encryption on credit and debit card chips encryption algorithm performance requirements security standards as a condition of processing credit card transactions

security standards as a condition of processing credit card transactions

If an antivirus tool is looking for specific bytes in a file (e.g., hex 50 72 6F etc.) to label it malicious, what type of AV detection is this? behavior reputation zero-day signature

signature

Why is it important to identify our critical information? so we can focus on protecting those assets first it's impossible to distinguish between critical information and the rest it's not important all information your organization has is equally important

so we can focus on protecting those assets first

Which of the following is *not* an example of how a living organism (e.g., insects or small animals) might constitute a threat to our equipment? interfere with cooling fans steal passwords cause electrical shorts chew on wiring

steal passwords

What was the primary topic of the material that Edward Snowden released? Vault7 cyber tools CIA human assets (spies) overseas nuclear weapons surveillance of electronic communications of US citizens

surveillance of electronic communications of US citizens

In a security context, tailgating is... removing a door from its hinges in order to bypass security enjoying the weather, friends, and food before a football game following too closely in a car the act of following someone through an access control point

the act of following someone through an access control point

Why might using the wireless network in a hotel with a corporate laptop be dangerous? the network may not be secure it may be slow it may be expensive

the network may not be secure

What is a cyber attack surface? the number of vulnerabilities in the network area of security the total of the number of available avenues through which our system might be attacked the number of vulnerabilities in the human area of security the size of the facility housing our critical systems

the total of the number of available avenues through which our system might be attacked

For what might we use the tool Kismet? to block network traffic to patch computers to detect wireless devices to detect wired devices

to detect wireless devices

Why might we want to use RAID? to ensure that we do not lose data from hardware failures in individual disks to protect against theft of the computer housing RAID disks to encrypt data to destroy data

to ensure that we do not lose data from hardware failures in individual disks

Why is input validation important from a security perspective? to prevent certain types of attacks to ensure bank balances are correct to authenticate users to catch brute force attacks

to prevent certain types of attacks

How might we use a sniffer to increase the security of our applications? to read (decrypt) encrypted traffic to slow down network traffic to speed up network traffic to watch the network traffic being exchanged with a particular application or protocol

to watch the network traffic being exchanged with a particular application or protocol

Why are humans considered to be the weak link? technical solutions are not effective user actions can bypass all of our other security measures good cryptography is not in place we have no other security measures in place

user actions can bypass all of our other security measures

In the operations security process, what is the difference between a vulnerability and a threat? vulnerabilities are weaknesses, threats are actors threats only affect the operating system threats are weaknesses, vulnerabilities are actors vulnerabilities only exist in software

vulnerabilities are weaknesses, threats are actors

Does an organization's location or the national origin or location of data they are transmitting or storing affect the organization's use of encryption or how they treat employee information? yes no

yes

Are nmap results always accurate, or is it sometimes necessary to verify nmap output with another tool? you do not need to verify nmap results with another tool or data source you should verify nmap results with another tool or data source

you should verify nmap results with another tool or data source


Kaugnay na mga set ng pag-aaral

ISDS- Chapter 8: Understanding Big Data and Its Impact on Business

View Set

Theology 104 - Module 5 Study Guide (LUOA)

View Set

Managerial Accounting: Chapter 7. Activity Based Costing

View Set

Summary of Project Plans & Documents

View Set