Security+ Cert Exam Objectives SYO-601

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Hybrid warfare

- Combining conventional warfare with cyberwarfare

Reconnaissance

- Information gathering about a target network

Password Attack

Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

Rogue access point

Any unauthorized WAP for a network. Not always malicious.

Disassociation

Attack where a wireless connection is disrupted by having the user dicsonnect.

Jamming

Attack where a wireless connection is disrupted through RF interference

Bluesnarfing

Attack where data is accessed without the user's knowledge on their Bluetooth-enabled device.

Universal resource locator (URL) hijacking

Attack where either the attacker makes a site with a domain name similar enough to a legitimate domain for the sake of redirecting people to their site instead (used for phishing, redirecting traffic, or just infecting people with malware) or sells this misspelt domain to trick the actual domain owner.

Domain hijacking

Attack where the attacker is able to take control of someone else's domain through the domain registration.

Pass the hash

Attack where the hash and login info is captured during an authentication request by an attacker and sent in lieu of client to generate their own authentication request.

Secure sockets layer (SSL) stripping

Attack where the security protocol of a connection is downgraded making it no longer secure, e.g. making an https into an http connection. Default port is 443

Driver manipulation

Attack where the trust a computer has for drivers (devices like peripherals or specific internal hardware like speakers) and uses that to get around typical security protections.

Principles:

Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.

Domain reputation

The reputation of a domain, used by browsers to determine how safe/unsafe a domain is. With a bad reputation traffic for the domain will dramatically decrease.

Spyware

Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.

Vishing

Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward

Smishing

When someone tries to trick you into giving them your private information via a text or SMS message.

Shoulder Surfing

When someone watches over your shoulder to nab valuable information as you key it into an electronic device.

MAC Cloning

Where an attacker will change the MAC address to their device so that it has a MAC address that is within the table so that their device will take all the traffic from switch instead of the legitimate device.

Improper input handling

Where in error handling the programmer either gives too much or too little information as to what caused the error when the program runs into one. Too much is bad because it lets a user know more about how an application is programmed than they are supposed to and too little means there's no way to know what caused that error and how to fix it.

Malware

a program or file designed to be disruptive, invasive and harmful to your computer.

Rainbow Tables

an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password

brute force password attack (offline and online)

an attempt to guess a password by attempting every possible combination of characters and numbers in it

Pharming

cyberattack intended to redirect a website's traffic to another, fake site.

Dumpster Diving

exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.

Phishing

fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

Identity Fraud

identity fraud is the use of stolen information such as making fake ID's and fake bank accounts

Spam

irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware

potentially unwanted program (PUP)

program that installs itself on a computer, typically without the user's informed consent

Backdoor

refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.

Watering hole attack

security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.

Bots

self-propagating malware that infects its host and connects back to a central server(s).

Rootkit

software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine

Keyloggers

software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

Spear Phishing

the act of sending emails to specific and well-researched targets while pretending to be a trusted sender

Pretexting

the practice of presenting oneself as someone else in order to obtain private information.

Credential Harvesting

the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.

Typo squatting

type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system

Remote Access Trojan

type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.

Impersonation

typically involves an email that seems to come from a trusted source.

Invoice Scams

using fraudulent invoices to steal from a company

Cryptographic attacks

1. Birthday: An attacker will create many plaintexts to try and find common hashes in order to figure out the hash algorithm. 2. Collision: When 2 different inputs of hashes have the same output. 3. Downgrade: When a worse encryption is used instead of the most secure one because the attacker forcefully downgraded it.

Request forgeries

1. Server-side: Attack where the web server of an application has request forgeries sent to it allowing the attacker to access data and resources from the application that even a legitimate user can't access. 2. Cross-site: Where a cross-site connection (e.g. a youtube video on a news website) is exploited to allow an attacker to access a website as a legitimate user. Abuses browser trust (w/o browser trust you would need to login to be able to share things from one site to another via the cross-site connection).

Adversarial artificial intelligence (AI)

1. Tainted training for machine learning (ML) 2. Security of machine learning algorithms

Race conditions(Time of check/time of use)

A race condition where the security changes during the object's access

Wireless Evil Twin

A rogue access point that is there to trick people into using it instead of the proper WAPs to steal data from them.

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

Radio frequency identifier (RFID)

A small device that is inserted into something for keeping track of its location. It's very common.

Dynamic link library

A windows library containing code and data, many applications can use this library.

Initialization Vector (IV)

Any string of bits that is used to make block cryptography more secure. If found it makes breaking the cryptography far easier.

FQDN (Fully Qualified Domain Name)

A host name plus domain name that uniquely identifies a computer or location on a network.

command and control

A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network

logic bomb

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

MSSQL (Microsoft SQL Server)

A database software that uses SQL made by Microsoft for Microsoft systems. Registered on TCP ports 1433 and 1434.

WAP (Wireless Access Point)

A device that provides a connection between wireless devices and can connect to wired networks, essentially replaces ethernet cables for connected to a router. Not the same thing as a router.

Domain Name System (DNS)

A hierarchical system for naming resources on the Internet.

Malicious flash drive

Any type of Flash Drive that performs an unexpected and unwanted function. For example, downloading malware, takes control of the device by pretending to be a peripheral, etc.

Malicious universal serial bus (USB) cable

Any type of USB cable that performs an unexpected and unwanted function. For example, downloading malware onto the device, takes control of the device by pretending to be a peripheral, etc.

Cross-site scripting

Also known as an XSS attack. An attack where the website has poor input validation that allows an attacker to input scripts into a search bar (any place a website lets the user write)

Dictionary password attack

An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.

Address resolution protocol (ARP) poisoning/spoofing

An attack that convinces the network that the attacker's MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker's machine, happens during traffic transfer.

Buffer overflows

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer

Media access control (MAC) flooding

An attack that sends numerous packets to a switch, each of which has a different source MAC address, in an attempt to use up the memory on the switch. If this is successful, the switch will change state to fail-open mode. Goal is to remove legitimate devices from ARP table.

Directory traversal

An attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories

Replay attack (session replays)

An attack that takes the raw network data of a legitimate session a client has with the server and resends that data after the client has finished their session, allows the attacker to be able to access all the resources and data legitimate clients can access.

On-path attack(Man-in-the-middle)

An attack where a connection between two or more parties has an unknown participant who is able to capture all traffic between the parties. Attacker can do lots of very bad things with this.

Skimming

An attack where a device is added to a transaction device (atm, card reader, etc.) that will steal the card's info in order to clone it.

Supply-chain attacks

An attack where an organization is attacked through a third-party vendor who likely has worse security. Through the attack, the attacker can create counterfeit devices, exploit the vendor's vulnerability to infiltrate the target organization's network, or tamper with underlying infrastructure.

Card cloning

An attack where card (credit card, gift card, etc.) has a copy created by using a skimmer. Can only be used on magnetic stripe cards, not through a chip.

Privilege escalation

An attack where the attacker gains higher-level access to a system. Gives them more control and abilities over the target system.

Spraying password attack

An attack where the attacker will try to login into a system using common passwords, they will try a few times if it doesn't work they'll move onto another account. This allows there to be no alerts to the website or warnings for the proper users.

Application programming interface (API) attacks

An attack where the new avenues of communication offered by an API is taken advantage of for hostile use.

Influence campaigns

An attack which is meant to influence the populous on political and social issues. This is done by creating fake users, making up content, getting real users to amplify it until it gets picked up by mass media as if it's the truth.

Plaintext/unencrypted password attack

An attacks where the attacker knows the plaintext and the ciphertext and uses the two to deduct the cipher.

Injections

An injection is simply any attack where an attacker inserts their own code into an application/website/server to access things they aren't supposed to.

Memory leak

An undesirable state in which a program requests memory but never releases it, which can eventually prevent other programs from running.

DNS poisoning

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

Structured query language (SQL)

The most common language for relational database management. SQL services use ports 118 and 156 by default.

MySQL

The most common version of SQL registered on port 3306.

Cloud-based vs. on-premises attacks

Cloud-based puts the burden on the vendor while on-premises attacks put the burden on the client.

Tailgating

Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

Fileless virus

Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

Bluejacking

Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers.

SPIM

Spam delivered through instant messaging (IM) instead of through e-mail messaging

Whaling

Spear phishing that focuses on one specific high level executive or influencer

Resource exhaustion

State that occurs when the device is out of memory or cpu cycles, and then shuts down. A specialized DoS attack.

Hoax

Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.

Lightweight directory access protocol (LDAP)

Directory management protocol. Originally made for and by telephone companies, but now is used by everyone. Default port is 389.

Shimming

Driver manipulation attack where the attacker takes advantage of backwards compatibility shims to get around security.

Refactoring

Driver manipulation attack with metamorphic malware that changes every time it is downloaded to get around anti-virus. The malware might only have extra NOP instructions, reorder functions, modify application flow, or change bits of the code all to make it different enough from a malware the anti-virus can already catch.

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

Pointer/object dereference

Is used to access or manipulate data contained in memory location pointed to by a pointer. *(asterisk) is used with pointer variable when dereferencing the pointer variable, it refers to variable being pointed, so this is called dereferencing of pointers

Extensible markup language (XML)

Language for markup that uses tags to describe the structure and content of a document, not the format used.

Cryptomalware

Malware to remain in place for as long as possible, quietly mining in the background.

Integer overflow

Memory vulnerability where too large a number is put into a place that only takes smaller numbers, causes issues. The number will either end up invalid (negative where there needs to be a positive, vice versa) or it can reset.

Error handling

Part of programming where the programmer accounts for errors and sends information about the error to the user when the application encounters such an error.

Social Media Campaign

Planned, coordinated marketing efforts using one or more social media platforms.

Prepending

Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.

Eliciting Information

Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform


संबंधित स्टडी सेट्स

Chapter #1: The International Economy and Globalization

View Set

AST Exam 2 Review (Ch 5, 6, 14, 15

View Set

Pharmacology: Adrenergic Agonist/Blocking & Cholinergic Agonist/Blocking Drugs

View Set

MGT Chapter 12: Motivating Employees

View Set

Computer Fundamentals Module 1 - Impact of Digital Technology - Quiz

View Set

Chapter 11 Milady Esthetics Disorders and diseases of the skin

View Set