Foundations of Cyber Security
What is cyberspace? (4) - answer Information systems, data on them, services they
provide, network device used for communication
What is a cyberattack? - answer Malicious attempt to damage, disrupt, or gain
unauthorized access to computer systems, network or devices
What is a cyber vulnerability? (2) - answer Weakness or loophole in system
What is cyber security? - answer Protection of cyberspace from harm, misuse, or
unauthorized access
UK's National Cyber Security Strategy - answer Defend, deter, develop
Who can be behind cyber-attacks? (5) – answer Cyber criminals, nation states,
hacktivists, insider threats, script kiddies/noobs
Cyber criminal's typical motive - answer Money
Cyber criminal's typical attacks (5) - answer Money theft, document ransom, data
breach, DDoS
DDoS - answer Distributed Denial of Service
Cyber criminal's typical attack vectors (3) - answer Malware, email, botnet
Cybercriminal example - answer Albert Gonzalez, 2005-2007
Nation state's typical motives (3) - answer Collecting information, sabotage, subversion
Nation state's typical attacks (3) - answer Influencing campaigns, data breach, DDoS
Nation state's typical attack vectors (4) - answer Malware, botnets, emails, social media
Nation state examples (5) - answer US election, China's Marriott hack, Stuxnet,
Ukraine, Estonia
Hacktivist motives (3) - answer Religious, social, and political
Hacktivist typical attacks (4) - answerWeb defacement, data breach, information leak,
DDoS
, Hacktivist typical attack vector (3) - answerMalware, email, botnet
Hacktivist examples (2) - answerAnonymous, Snowden
Insider threat - answerComes from someone with legitimate access to resources
Insider threat motives (3) - answerPersonal vendetta, bribe, blackmail
Types of insider threat (2) - answerIntentional and unintentional
Intentional insider typical attacks (2) - answerInformation leak, install a logic bomb
Unintentional insider typical attacks (3) - answerAccidental posting/deleting information,
visit websites infected with malcode
Script Kiddies/Noobs - answerLess skilled hackers
Script Kiddies/Noobs motives (3) - answerDesire to join real groups, challenge, curiosity
Insider threat examples - answerSnowden, Manning, Reality Winner
Script Kiddie example - answerTalkTalk 2015
Kill chain stages (7) - answerReconnaissance
Weaponize
Delivery
Exploitation
Installation
Command-and-control
Actions on objectives
Reconnaissance - answerTarget research and selection, ends when attacker knows
enough
Reconnaissance example - answerIdentifying the security means used by the target via
online research
Weaponize - answerDevelopment or purchase of cyber weapons
Weaponize examples (3) - answerMalicious payload, social engineering, remote access
trojan
Delivery - answerDelivery of payload to target
Delivery examples (3) - answerTarget downloads from website, USB, email attachment