M IAASr
M IAASr
M IAASr
MitM
Ethical hackers who use their programming skills for good, ethical, and legal purposes. – White hat hackers
Unethical criminals who violate computer and network security for personal gain or for malicious reasons, such as attacking
networks. – Black hat hackers
Individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage. – grey hat
hackers
The total sum of the vulnerabilities in a given system that is accessible to an attacker and describes different points where an
attacker could get into a plan and where they could get data out of the system. - Attack surface
A path by which a threat actor can access a server, host, or network. – attack vector
The likelihood that a particular threat will exploit a specific vulnerability of an asset and result in an undesirable consequence.
– risk
Some or all of the risk is transferred to a willing third party, such as an insurance company. – risk transfer
This is when the cost of risk management options outweighs the cost of the risk itself. The risk is accepted, and no action is
taken. – risk acceptance
This reduces exposure to risk or the impact of risk by taking action to decrease the risk and mitigation strategy – risk reduction
This occurs when an individual lies to gain access to confidential data. – Pretexting
The process of going through a target's trash to see discarded information. - Dumpster Diving
An act intended to deceive or trick someone can cause just as much disruption as an actual security breach – hoax
A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members
of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's
workplace. - Watering hole attack
A form of cybercrime that involves hackers registering domains with deliberately misspelled names of well-known websites.
Hackers do this to lure unsuspecting visitors to alternative websites, typically for malicious purposes – Typosquatting
The attacker impersonates the vendor and creates a fake invoice that looks identical to a real invoice, and sends it to the target
client - Invoice scam
Refers to when an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order
to make the message appear more trustworthy. Values like that are usually automatically added by a user's email client. –
Prepending
A malicious program that waits for a trigger, such as a specified date or database entry, to set off the malicious code. – logic
bomb
It refers to recording or logging every key struck on a computer’s keyboard. – keyboard logging
Occurs when an attacker copies information, such as emails and contact lists, from a target’s device using a Bluetooth
connection – Bluesnarfing
A clever programmer capable of developing new programs and coding changes to existing programs to make them more
efficient. -hacker
Typically refer to grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or
rewards – vulnerability brokers
Threat actors who steal government secrets, gather intelligence, and sabotage networks of foreign governments, terrorist
groups, and corporations. - State-sponsored
A term for black hat hackers who are self-employed or working for large cybercrime organizations. – Cybercriminals
Leading efforts to automate cybersecurity information sharing with public and private organizations at no cost. – CISA
The process that balances the operational costs of providing protective measures with the gains achieved by protecting the
asset. – risk management
Many network attacks can be prevented by sharing information about indicators of compromise
It contains a 4-bit binary value set to 0100 that identifies this as an IPv4 packet. – version
A 4-bit field containing 20 bytes is the minimum length of the IP header. - Internet Header length
Specify the IP packet's length (IP header + user data) - Total length
A calculated value based on the contents of the IP header determines any transmission-introduced errors - Header checksum
It contains a 32-bit binary value that represents the source IPv4 address of the packet. - Source IPv4 Address A
It contains a 32-bit binary value that represents the destination IPv4 address of the packet.- Destination IPv4 Address B
This field that varies in length from 0 to a multiple of 32 bits and If the values are not a multiple of 32 bits, 0s are added or
padded to ensure that this field contains a multiple of 32 bits- Options and Padding
This 16-bit field indicates the length of the data portion or payload of the IPv6 packet. - Payload Length
This 20-bit field suggests that all packets with the same flow label receive the same type of handling by routers. - Flow Label
In IPv6 header field, this value decrements by a value of 1 by each router that forwards the packet - Hop Limit
In IPv6 header field this 8-bit field is equivalent to the IPv4 Differentiated Services (DS) field. - Traffic Class
This 128-bit field identifies the IPv6 address of the sending host. - Source IPv6 Address
This 128-bit field identifies the IPv6 address of the receiving host. - Destination IPv6 Address
Threat actors spoof the source IP address to perform blind spoofing or non-blind spoofing. - Address spoofing attacks
Threat actors attempt to prevent legitimate users from accessing information or services.- Denial-of-Service (DoS) attacks
Threat actors use ICMP echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood
attacks, and to alter host routing tables. - ICMP attacks
Threat actors gain access to the physical network, and then use an MiTM attack to hijack a session. - Session hijacking
This is a provisional response, consisting only of the Status-Line and optional headers. It is terminated by an empty line. There
are no required headers for this class of status code. Servers MUST NOT send this response to an HTTP/1.0 client except under
experimental conditions. - Informational 1xx
This is for cases in which the client seems to have erred - Client Error 4xx
The client’s request was successfully received, understood, and accepted.- Successful 2xx
This is for cases where the server is aware that it has erred or cannot perform the request - Server Error 5xx
Further action must be taken by the user agent to fulfill the request. A client SHOULD detect infinite redirection loops, because
these loops generate network traffic for each action.- Redirection 3xx
This involves limiting the spread of a worm infection to areas of the network that are already affected. – containment
Involves tracking down and identifying infected machines within the contained areas and disconnecting, blocking, or removing
them – Quarantine
All uninfected systems are patched with the appropriate vendor patch – Inoculation
Detect changes in the response time of hosts to determine whether the hosts are processing more traffic than their own traffic
loads would indicate - Anti-sniffer software and hardware tools
Typically the precursor to other attacks that have the intent of gaining unauthorized access to a network or disrupting network
functionality. - Reconnaissance attacks
It helps prevent hosts from getting infected and spreading malicious code by detecting and eliminating viruses. - Antivirus
software
Occurs when web pages that are executed on the client-side, within their own web browser, are injected with malicious
scripts. - Cross-Site Scripting
This is permanently stored on the infected server and is received by all visitors to the infected page.- Stored (persistent)
• Software Error
-An application going offline
-A software bug
-A cross-site script or illegal file server share
• Natural Disasters
-Floods.
--Severe storms such as hurricanes or tornados.
-Earthquakes
-Fires
• Utility Interruption
-Electrical power outages
-Water damage resulting from sprinkler failure
• Sabotage
-An authorized user compromising an organization’s primary database
-The defacement of an organization’s website
Threats to Devices
Devices left powered on and unattended
Downloading files, photos, music or videos from unreliable sources
Insertion of unauthorized USB drives, CDs or DVDs on networking devices.
New viruses, worms and other type of malware.
No policies in place to protect an organization’s IT infrastructure.
Software with vulnerabilities installed on an organization’s devices
Use of outdated hardware or software
Threats to LAN
Exploits of data in transit
LAN servers with different hardware or operating systems
Misconfigured firewalls
Network operating system or software vulnerabilities and updates.
Rogue users gain unauthorized access to wireless networks.
Unauthorized access to systems, applications, and data
Unauthorized access to wiring closets, data centers, and computer rooms.
Unauthorized network probing and port scanning
Threats to Application
Client-server or web application development vulnerabilities
Data loss
Network operating system software vulnerabilities
Server downtime during maintenance periods
Someone gaining unauthorized access to data centers, computer rooms, wiring closets or systems