Security + Study Guide Lesson 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are assessing whether to join AIS. What is AIS and what protocol should your SIEM support in order to connect to AIS servers?

Automated Indicator Sharing (AIS) is a service offered by the Department of Homeland Security (DHS) for participating in threat intelligence sharing. AIS uses the Trusted Automated eXchange of indicator information (TAXII) protocol as a means of transmitting CTI data between Servers and Clients

You are consulting on threat intelligence solutions for a supplier of electronic voting machines. What type of threat intelligence source would produce the most relevant information at the lowest cost

For critical infrastructure providers, threat data sharing via an information sharing and analysis center (ISAC) is likely to be the best option

Which type of threat actor is primarily motivated by the desire for social change>

Hacktivist

Your CEO wants to know if the company's threat intelligence platform makes effective use of OSINT. What is OSINT?

Open-source intelligence (OSINT) is cybersecurity-relevant information harvested from public websites and data records. In terms of threat intelligence specifically, it refers to research and data feeds that are made publicly available

You are assisting with writing an attack surface assessment report for a small company. Following the CompTIA syllabus, which two potential attack vectors have been omitted from the following headings in the report? Direct access, Email, Remote and wireless, web and social media, cloud

Removable media and supply chain

Which of the following would be assessed by likelihood and impact: Vulnerability, Threat, or Risk?

Risk: To assess likelihood and impact you must identify both the vulnerability and the threat posed by a potential exploit

Open Source Intelligence (OSINT)

Some companies operate threat intelligence services on an open-source basis, earning income from consultancy rather than directly from the platform or research effort

Direct access

This is a type of physical or local attack. The threat actor could exploit an unlocked workstation, use a boot disk to try to install malicious tools, or steal a device for example

Sophisticated threat actors

Will make use of multiple vectors. They are likely to plan a multi-stage campaign, rather than a single "smash and grab" type of raid

malicious insider

a current or former employee, contractor, or business partner who has or had authorized access to an organization's network, system, or data and intentionally exceed or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems

Tactic, technique, procedure (TTP)

a generalized statement of adversary behavior. TTPs categorize behaviors in terms of campaign strategy and approach (tactics), generalized attack vectors (techniques), and specific intrusion tools and methods (procedures)

unintentional or inadvertent insider threat

a vector for an external actor, or a separate malicious internal actor to exploit, rather than a threat actor in its own right

Vulnerability

a weakness that could be triggered accidentally or exploited intentionally to cause a security breach

Attack surface

all the points at which a malicious threat actor could try to exploit a vulnerability

White hat hacker

always seeks authorization to perform penetration testing of private and proprietary systems

Threat Map

an animated graphic showing the source, target, and type of attacks that have been detected by a CTI platform

Insider Threat

arises from an actor who has been identified by the organization and granted some sort of access

white hat hacker

authorized

criminal syndicate

can operate across the internet from different jurisdictions than its victim, increasing the complexity of prosecution

Advanced Persistent Threat (APT)

coined to understand the behavior underpinning modern types of cyber adversaries

Threat data

computer data that can correlate events observed on a customer's own networks and logs with known TTP and threat actor indicators

Example of vulnerability

delays in applying and testing software and firmware patches

indicators

describe how to recognize what those actions might look like

TTPs

describe what and how an adversary acts

Hacker

describes an individual who has the skills to gain access to computer systems through unauthorized or unapproved means

Structured Threat Information eXpression (STIX)

describes standard terminology for locs and ways of indicating relationships between them

intent

describes what an attacker hopes to achieve from the attack

Example of vulnerability

design flaws in software or operating systems, such as unchecked user input

The goals of state actors are primarily

espionage and strategic advantage, but is not unknown for countries

Cyber Threat Intelligence (CTI) data

feeds that integrate with a security information and event management platform (SIEM)

state actors

have been implicated in many attacks, particularly on energy and health network systems

File code repository

holds signatures of known malware code

Example of vulnerability

improperly configured or installed hardware or software

Public/Private Information Sharing Centers

in many critical industries, information sharing and analysis centers (ISACs) have been set up to share threat intelligence and promote best practice. These are sector-specific resources for companies and agencies working in critical industries, such as power supply, financial markets , or aviation. Where there is no coverage by an ISAC, local industry groups and associations may come together to provide mutual support

Example of vulnerability

inadequate physical security

Example of vulnerability

insecure password usage

Reputational threat intelligence

lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware

Web and social media

malware may be concealed in files attached to posts or presented as downloads. An attacker may also be able to compromise a site so that it automatically infects vulnerable browser software (a drive by download). Social media may also be used more subtly, to reinforce a social engineering campaign and drive the adoption of trojans

Cloud

many companies now run part or all of their network services via internet- accessible clouds. The attacker only needs to find one account, service or host with weak credentials to gain access. The attacker is likely to target the accounts used to develop services in the cloud or manage cloud systems. They may also try to attack the cloud service provider (CSP) as a way of accessing the victim system

hacktivists

might attempt to obtain and release confidential information to the public domain, perform denial of service (Dos) attacks, or deface websites

script kiddie attacks

might have no specific target or any reasonable goal other than gaining attention or proving technical abilities

gray hat hacker

might seek voluntary compensation of some sort (a bug bounty), but will not use an exploit as extortion

Example of vulnerability

misuse of software or communication protocols

malicious external threat

must infiltrate the security system using malware and/or social engineering

Behavioral threat research

narrative commentary describing examples of attacks and TTPs gathered through primary research sources

internal/insider threat actor

one that has been granted permissions on the system

external threat actor or agent

one that has no account or authorized access to the target system

Common Vulnerabilities and Exposures (CVE)

operated by Mitre Information about vulnerabilities is codified as signatures and scanning scripts that can be supplied as feeds to automated vulnerability scanning software

Example of vulnerability

poorly designed network architecture

Vendor websites

proprietary threat intelligence is not always provided at cost. All types of security, hardware, and software vendors make huge amounts of threat research available via their websites as a general benefit to their customers. One example is Microsoft's security intelligence blog

Trusted Automated eXchange of Indicator Information (TAXII)

provides a means for transmitting CTI data between servers and clients

supply chain

rather than attack the target directly, a threat actor may seek ways to infiltrate it via companies in its supply chain. One high-profile example of this is the target data breach, which was made via the company's HVAC supplier

capability

refers to a threat actor's ability to craft novel exploit techniques and tools

APT

refers to the ongoing ability of an adversary to compromise network security to obtain and maintain access using a variety of tools and techniques

Dark web

sites, content, and services accessible only over a dark net. While there are dark web search engines, many sites are hidden from them. Access to a dark web site via its URL is often only available via "word of mouth" bulletin boards

script kiddies

someone who uses hacker tools without necessarily understanding how they work or having the ability to craft new attacks

Which three types of threat actors are most likely to have high levels of funding?

state actors, criminal syndicates, and competitors

Removable media

the attacker conceals malware on a USB thumb drive or memory card and tries to trick employees into connecting the media to a PC, laptop, or smartphone. For some exploits, simply connecting the media may be sufficient to run the malware in many cases, the attacker may need the employee to open a file in a vulnerable application or run a setup program

Remote and Wireless

the attacker either obtains credentials for remote access or wireless connection to the network or cracks the security protocols used for authentication. Alternatively, the attacker spoofs a trusted resource, such as an access point, and uses it to perform credential harvesting and then uses the stolen account details to access the network

Email

the attacker sends malicious file attachment via email, or via any other communications system that allows attachments. The attacker needs to use social engineering techniques to persuade or trick the user into opening the attachment

motivation

the attacker's reason for perpetrating the attack

Risk

the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability. To assess risk, you identify a vulnerability and then evaluate the likelihood of it being exploited by a threat and the impact that a successful exploit would have

attack vector

the path or tool used by a malicious threat actor

Attack vector

the path that a threat actor uses to gain access to a secure system

threat actor or threat agent

the person or thing that poses the threat

Threat

the potential for someone or something to exploit a vulnerability and breach security. It may be intentional or unintentional

AI

the science of creating machine systems that can simulate or demonstrate a similar general intelligence capability to humans

Closed/Proprietary

the threat research and CTI data is made available as a paid subscription to a commercial threat intelligence platform. The security solution provider will also make the most valuable research available early to platform

Shadow IT

users purchase or introduce computer hardware or software to the workplace without the sanction of the IT department and without going through a procurement and security analysis process. Shadow IT creates a new unmonitored attack surface for malicious adversaries to exploit

hacktivist group

uses cyber weapons to promote a political agenda

True or False? Nation state actors primarily only pose a risk to other states

False- nation state actors have targeted commercial interests for theft, espionage, and extortion

You receive an email with a screenshot showing a command prompt at one of your application servers. The email suggests you engage the hacker for a days consultancy to patch the vulnerability. How should you categorize this threat?

This is either gray hat (semi-authorized) hacking or black hat (non-authorized) hacking. If the request for compensation via consultancy is an extortion threat (if refused, the hacker sells the exploit on the dark web), then the motivation is purely financial gain and can be categorized as black hat. If the consultancy is refused and the hacker takes no further action, it can be classed as gray hat

Dark net

a network established as an overlay to internet infrastructure by software, such as the onion router (TOR), Freenet, or I2P, that acts to anonymize usage and prevent a third party from knowing about the existence of the network or analyzing any activity taking place over the network. Onion routing, for instance uses multiple layers of encryption and relays between nodes to achieve this anonymity

Indicator of compromise (IOC)

a residual sign that an asset or network has been successfully attacked or is continuing to be attacked. An IOC is evidence of TTP

Automated Indicator Sharing (AIS)

a service offered by the department of homeland security (DHS) for companies to participate in the threat intelligence sharing

gray hat hacker

semi-authorized, might try to find vulnerabilities in a product or network without seeking the approval of the owner; but they might not try to exploit any vulnerabilities they find

black hat hacker

unauthorized

Example of vulnerability

untested software and firmware patches

Machine learning (ML)

uses algorithms to parse input data and then develop strategies for using that data, such as identifying an object as a type, working out the best next move in a game, and so on


Set pelajaran terkait

ACCOUNTING 111 EXAM 1 Chapter 2 REVIEW

View Set

5.1.1.2 Basic Functions of an Operating System

View Set

4.7-8 Misrepresentation, Concealment, and Fraud definitions (Property)

View Set

MORT 275 - Mortuary Law I - Quiz 4

View Set

13. Legal Forms of Business Ownership--Small Business Entrepreneurship

View Set

Music Appreciation Modules 3 + 4

View Set

Cognitive Neuroscience: Biology of the Mind Chap 8-13

View Set

Chapter 7 - Skeletal System: Bone Structure and Function

View Set