1: 5 Common Attacks Flashcards
Hash Function
Maps data of an arbitrary size to a fixed-sized value
Brute Force Hash Analysis
Attacks the computer’s 1-way Hash Function through many input/output analysis to find vulnerabilities.
Where should hashes be stored?
Shadow Password File
Where shouldn’t hashes be stored
/etc/password File
Brute Force Attack
Guesses passwords by trying all possibilities
Dictionary Attack
Guesses passwords by using a list of all known words
Hybrid Attack
Guesses passwords by adding variations to known words
Rainbow Table Attacks
Guess passwords by precomputing common hashes
Password Spraying
Guesses passwords across multiple systems using a list of commonly used passwords
What is the best way to protect against password spraying?
Prohibit the use of common passwords
Credential Stuffing
Attacking by reusing the same username/password against multiple sites. This username/password can be obtained by initially targeting the weakest sites.
What is the best way to protect against credential stuffing?
Password manager tools and maintaining unique passwords
Multi-Factor Authentication
Electronic authentication method in which a device user is granted access to a website or application only after successfully presenting two or more pieces of evidence.
What are the three types of machine learning?
Descriptive analytics, predictive analytics, prescriptive analytics
Descriptive Analytics
Describes our data
Predictive Analytics
Predict future events
Prescriptive Analytics
Optimize our behavior by running many simulations
Adversarial AI
Breach confidentiality of machine learning algorithms, including injecting tainted data into simulations or fooling algorithms.
What is the best way to protect against Adversarial AI
Build robust AI models