Cyber exam prep
Cyber exam prep
Zero-day: A software vulnerability unknown to those responsible for fixing it. Hackers
exploit it before a patch is available, making it extremely dangerous.
Business Continuity Plan (BCP): A strategic plan to ensure critical business functions
continue during a crisis (e.g., cyberattack, power outage). Includes backups, alternate
sites, communication, and recovery.
Hacker: Someone skilled in technology who breaks into systems. Can be white-hat
(ethical), black-hat (malicious), or gray-hat (mixed motives).
Security Controls: Tools and procedures to protect systems. Types: physical (locks),
technical (firewalls), and administrative (policies).
Logic Bomb: Code hidden within software that activates when triggered by certain
conditions, causing harm like deleting files.
Risk: The chance of loss or damage when a threat exploits a vulnerability.
Honeypot: A decoy system meant to lure attackers and study their behavior without
harming real assets.
Dark Web: A part of the internet not indexed by traditional search engines, often used
for illicit activities. Accessed via Tor.
IDS & IPS: IDS (Intrusion Detection System) monitors and alerts on suspicious activity.
IPS (Intrusion Prevention System) detects and actively blocks threats.
Phishing: Fraudulent attempts to obtain sensitive data (passwords, credit card info) via
fake emails, websites, or messages.
2. Types of Malware:
Why a nuisance:
Hard to detect
Use sophisticated, custom-made tools
Often involve social engineering
Humans can:
Improvement:
Security training reduces human error, which is a major cause of breaches. Trained
employees:
Training empowers the human firewall and reinforces the organization’s security
posture. Regular training ensures everyone stays updated with emerging threats.
13. Lifecycle of a Cyberattack Through Malware:
1. Avoidance: Remove the risk entirely (e.g., not using certain software)
2. Reduction: Apply controls to reduce impact (e.g., firewalls)
3. Transfer: Use insurance or outsource risk (e.g., cloud security)
4. Acceptance: Acknowledge and prepare for minor risks
Lack of updates
Weak passwords
Insider threats
Sophisticated phishing/social engineering
Misconfigured systems
Methods:
Security guards, CCTV
Biometric access controls
Secure server rooms
Lockable devices
b. IT Risk Management:
Access is granted according to roles (e.g., HR, IT) and predefined permissions.
In Discretionary Access Control, resource owners decide who can access their
resources.
Example:
A knowledge base of attacker tactics, techniques, and procedures (TTPs). Helps in:
Threat modeling
Defensive planning
Red teaming
OWASP: Open Web Application Security Project – nonprofit improving web app
security
A list of the most critical web app security risks (e.g., SQL Injection, XSS, broken
authentication)
Used for awareness and secure coding practices