Security+ Long Study 2
2.0 Threats, Vulnerabilities, and Mitigations (22%)
2.1 Compare and contrast common threat actors and motivations.
2.2 Explain common threat vectors and attack surfaces.
2.3 Explain various types of vulnerabilities.
2.4 Given a scenario, analyze indicators of malicious activity.
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
2.1 Compare and contrast common threat actors and motivations
🟠 Threat Actors
● Nation-state → Government-sponsored entities targeting other nations for political, economic, or military purposes.
● Unskilled Attacker → Individuals with limited technical expertise or resources attempting to exploit vulnerabilities.
● Hacktivist → Individuals or groups motivated by political or social causes, engaging in cyberattacks to promote their agenda.
● Insider Threat → Current or former employees, contractors, or partners with insider access to systems and data, posing a risk to security.
● Organized Crime → Groups engaged in illegal activities, including cybercrime, for financial gain.
● Shadow IT → Unauthorized IT systems or services implemented within an organization without official approval or oversight.
🟠 Attributes of Actors
● Internal/External → Whether the threat actor operates from within the target organization or externally.
● Resources/Funding → The level of financial and technological resources available to the threat actor.
● Level of Sophistication/Capability → The technical expertise and sophistication of the threat actor’s tactics, techniques, and procedures (TTPs).
🟠 Motivations
● Data Exfiltration → Stealing sensitive data for espionage, financial gain, or sabotage.
● Espionage → Gathering intelligence or intellectual property for political, economic, or military advantage.
● Service Disruption → Interrupting or disabling critical services to cause operational disruptions.
● Blackmail → Coercing victims by threatening to expose sensitive information or disrupt operations.
● Financial Gain → Monetizing stolen data, conducting ransomware attacks, or engaging in cybercrime for profit.
● Philosophical/Political Beliefs → Acting in alignment with ideological or political agendas.
● Ethical → Conducting security research or penetration testing with permission to identify vulnerabilities and improve defenses.
● Revenge → Retaliating against individuals, organizations, or entities perceived as adversaries.
● Disruption/Chaos → Creating chaos or confusion for strategic or ideological reasons.
● War → Engaging in cyber warfare to achieve political, economic, or military objectives.
2.2 Explain common threat vectors and attack surfaces
🟠 Attack Vectors
● Message-based
🔹 Email → Using email communication to deliver malicious content or phishing attempts.
🔹 Short Message Service (SMS) → Sending malicious messages via text messaging.
🔹 Instant Messaging (IM) → Exploiting vulnerabilities in instant messaging platforms to deliver malware or scams.
● Image-based → Leveraging image files containing hidden malware or exploiting vulnerabilities in image processing software.
● File-based → Delivering malicious payloads through file attachments, such as infected documents or executables.
● Voice Call → Exploiting vulnerabilities in voice communication systems to deliver scams or phishing attempts.
● Removable Device → Infecting systems through the use of infected USB drives or external storage devices.
🟠 Vulnerable Software
● Client-based vs. Agentless → Exploiting vulnerabilities in client software or agentless systems to gain unauthorized access or deliver malware.
● Unsupported Systems and Applications → Targeting systems or applications that no longer receive security updates or patches.
🟠 Unsecure Networks
● Wireless → Exploiting vulnerabilities in wireless network protocols to intercept communications or gain unauthorized access.
● Wired → Eavesdropping or conducting man-in-the-middle attacks on wired network connections.
● Bluetooth → Exploiting vulnerabilities in Bluetooth connections to gain unauthorized access or deliver malware.
● Open Service Ports → Targeting open ports on networked devices to exploit known vulnerabilities or gain unauthorized access.
● Default Credentials → Exploiting devices or systems with default login credentials that have not been changed.
🟠 Supply Chain
● Managed Service Providers (MSPs) → Exploiting vulnerabilities in services provided by third-party managed service providers.
● Vendors → Targeting vulnerabilities in software or hardware provided by vendors.
● Suppliers → Exploiting vulnerabilities in components or services provided by suppliers.
🟠 Human Vectors/Social Engineering
● Phishing → Sending fraudulent emails or messages to trick individuals into revealing sensitive information or performing actions.
● Vishing → Using voice communication to deceive individuals into divulging sensitive information.
● Smishing → Sending deceptive text messages to trick individuals into revealing information or downloading malware.
● Misinformation/Disinformation → Spreading false or misleading information to manipulate individuals or organizations.
● Impersonation → Pretending to be someone else to deceive individuals or gain unauthorized access.
● Business Email Compromise → Targeting employees with fraudulent emails to trick them into transferring funds or sensitive information.
● Pretexting → Creating a false pretext or scenario to manipulate individuals into revealing information or performing actions.
● Watering Hole → Compromising websites frequented by target individuals or organizations to deliver malware or conduct attacks.
● Brand Impersonation → Impersonating reputable brands or organizations to deceive individuals into taking actions.
● Typosquatting → Registering domain names similar to legitimate ones to deceive users into visiting malicious websites.
2.3 Explain various types of vulnerabilities
🟠 Application
● Memory Injection → Exploiting vulnerabilities to inject malicious code into a running process’s memory space.
● Buffer Overflow → Overwriting adjacent memory locations to execute malicious code or crash the application.
● Race Conditions → Exploiting vulnerabilities related to timing issues in code execution:
🔹 Time-of-Check (TOC) → Exploiting the time gap between checking a condition and acting on it.
🔹 Time-of-Use (TOU) → Exploiting changes in system state between the time of validation and the time of use.
● Malicious Update → Distributing updates or patches that contain malicious code or backdoors.
🟠 Operating System (OS)-Based
● Exploiting vulnerabilities in the operating system to gain unauthorized access or disrupt operations.
🟠 Web-Based
● Structured Query Language Injection (SQLi) → Exploiting vulnerabilities in web applications to execute malicious SQL queries.
● Cross-Site Scripting (XSS) → Injecting malicious scripts into web pages viewed by other users.
🟠 Hardware
● Firmware → Exploiting vulnerabilities in device firmware to gain unauthorized access or control.
● End-of-Life → Exploiting vulnerabilities in devices or systems that are no longer supported by the manufacturer.
● Legacy → Exploiting vulnerabilities in older hardware or software that is still in use.
🟠 Virtualization
● Virtual Machine (VM) Escape → Exploiting vulnerabilities in virtualization software to break out of a virtual machine and access the host system.
● Resource Reuse → Exploiting shared resources in virtualized environments to gain unauthorized access or disrupt operations.
🟠 Cloud-Specific
● Exploiting vulnerabilities in cloud services or infrastructure to gain unauthorized access or disrupt operations.
🟠 Supply Chain
● Service Provider → Exploiting vulnerabilities in services provided by third-party vendors or service providers.
● Hardware Provider → Exploiting vulnerabilities in hardware components provided by suppliers.
● Software Provider → Exploiting vulnerabilities in software provided by third-party vendors or service providers.
🟠 Cryptographic
● Exploiting weaknesses or vulnerabilities in cryptographic protocols or implementations.
🟠 Misconfiguration
● Exploiting misconfigured settings or permissions to gain unauthorized access or disrupt operations.
🟠 Mobile Device
● Side Loading → Installing applications from unofficial or untrusted sources, which may contain malware.
● Jailbreaking → Removing software restrictions imposed by the manufacturer to gain access to unauthorized features or apps.
● Zero-Day → Exploiting vulnerabilities that are unknown to the software vendor or have not yet been patched.
2.4 Given a scenario, analyze indicators of malicious activity
🟠 Malware Attacks
● Ransomware → Malicious software that encrypts files or systems and demands payment for decryption.
● Trojan → Malware disguised as legitimate software, which performs unauthorized actions when executed.
● Worm → Self-replicating malware that spreads across networks and devices without user intervention.
● Spyware → Software designed to secretly gather user information or monitor activities without consent.
● Bloatware → Unwanted software that consumes system resources and may display intrusive advertisements.
● Virus → Malicious code that attaches itself to legitimate programs and spreads when those programs are executed.
● Keylogger → Software or hardware that records keystrokes, often used to capture sensitive information like passwords.
● Logic Bomb → Malicious code that executes a harmful action when specific conditions are met.
● Rootkit → Malware that grants unauthorized access to a computer system and conceals its presence from users and security software.
🟠 Physical Attacks
● Brute Force → Attempting to gain access to a system or account by systematically trying all possible passwords or encryption keys.
● Radio Frequency Identification (RFID) Cloning → Copying RFID tags to gain unauthorized access to secure areas or systems.
● Environmental → Physical damage or disruption caused by factors such as fire, water, or extreme temperatures.
🟠 Network Attacks
● Distributed Denial-of-Service (DDoS):
🔹 Amplified → Exploiting vulnerabilities to amplify the volume of traffic used in a DDoS attack.
🔹 Reflected → Spoofing the source IP address to redirect and amplify traffic towards a target.
● Domain Name System (DNS) Attacks → Disrupting or manipulating DNS services to redirect traffic or disrupt network operations.
● Wireless → Exploiting vulnerabilities in wireless networks or devices to gain unauthorized access or disrupt operations.
● On-Path → Intercepting and modifying network traffic between two parties to eavesdrop or manipulate data.
● Credential Replay → Capturing and reusing authentication credentials to gain unauthorized access to systems or services.
● Malicious Code → Executing unauthorized commands or actions on a target system.
🟠 Application Attacks
● Injection → Inserting malicious code or commands into an application to exploit vulnerabilities.
● Buffer Overflow → Writing data beyond the allocated memory buffer, potentially allowing attackers to execute arbitrary code.
● Replay → Capturing and replaying valid data packets to gain unauthorized access or perform malicious actions.
● Privilege Escalation → Exploiting vulnerabilities to gain elevated privileges and access restricted resources.
● Forgery → Creating and using falsified data or credentials to impersonate a legitimate user or system.
● Directory Traversal → Exploiting insufficient input validation to access files and directories outside of the intended directory structure.
🟠 Cryptographic Attacks
● Downgrade → Forcing a system to use weaker cryptographic protocols or algorithms to exploit vulnerabilities.
● Collision → Finding two different inputs that produce the same hash value, potentially leading to unauthorized actions.
● Birthday → Exploiting the mathematical probability of two different inputs producing the same hash value.
🟠 Password Attacks
● Spraying → Attempting to gain unauthorized access by using a small number of commonly used passwords against multiple accounts.
● Brute Force → Attempting to guess passwords by systematically trying all possible combinations until the correct one is found.
🟠 Indicators
● Indications or signs of potential security incidents, breaches, or abnormal activities within a system or network.
● Account lockout.
● Concurrent session usage.
● Blocked content.
● Impossible travel.
● Resource consumption.
● Resource inaccessibility.
● Out-of-cycle logging.
● Published/documented.
● Missing logs.
2.5 Explain the purpose of mitigation techniques used to secure the enterprise
🟠 Segmentation
● Involves dividing a network or system into smaller, isolated segments to enhance security by controlling access and limiting the impact of security incidents.
🟠 Access Control
● Access Control List (ACL) → List of permissions attached to an object that specifies which users or system processes are granted access to it and what operations they are allowed to perform.
● Permissions → Rights granted to users, groups, or processes that define their access levels to system resources.
● Application Allow List → A list of approved applications that are allowed to execute within an environment, reducing the risk of unauthorized or malicious software.
🟠 Isolation
● Separating critical systems or sensitive data from other parts of the network or environment to contain potential threats and limit their impact.
🟠 Patching
● Regularly applying software updates, patches, or fixes to address known vulnerabilities and improve system security.
🟠 Encryption
● Converting data into a secure form to prevent unauthorized access, especially during transmission or while stored on a device or server.
🟠 Monitoring
● Continuous surveillance of systems, networks, or applications to detect and respond to security threats or suspicious activities.
🟠 Least Privilege
● Principle of restricting access rights for users, accounts, or processes to only those necessary to perform their job functions.
🟠 Configuration Enforcement
● Ensuring that system configurations comply with security policies, standards, or best practices to minimize vulnerabilities.
🟠 Decommissioning
● Process of securely removing or shutting down systems, applications, or services that are no longer needed to prevent them from being exploited.
🟠 Hardening Techniques
● Methods to enhance the security of systems or networks by reducing their attack surface and minimizing potential vulnerabilities.
● Encryption → Protecting data by encoding it in a secure format.
● Installation of Endpoint Protection → Deploying security software on endpoints to detect and prevent malware infections.
● Host-based Firewall → Software-based firewall installed on individual hosts to control incoming and outgoing network traffic.
● Host-based Intrusion Prevention System (HIPS) → Security software that monitors and analyzes host system activities to detect and prevent intrusions.
● Disabling Ports/Protocols → Closing unused network ports or disabling unnecessary network protocols to reduce potential entry points for attackers.
● Default Password Changes → Replacing default passwords with strong, unique passwords to prevent unauthorized access.
● Removal of Unnecessary Software → Removing or disabling unnecessary software or services to minimize the attack surface and reduce potential vulnerabilities.