12.2 Cats Of Network Attacks Flashcards
Confidentiality attacks attempts to make confidential data viewable by an attacker, what are some methods?
Packet capture, ping sweep and port scan, dumpster diving, electromagnetic interference interception, wiretapping, man-in-the-middle, social engineering, sending info over overt channels, sending info over covert channels, malware, FTP bounce, phishing.
Integrity attacks attempt to alter data, what are some examples of integrity attacks?
Salami Attack, data diddling, trust relationship exploitation, password attack.
7 Types of Password Attacks:
Trojan horse, packet capture, keylogger, brute force, dictionary attack, bonnet, hijacking a session.
Availability attack methods:
Logic Bomb, Wireless attacks, Denial of Service, Distributed Denial of Service, TCP SYN Flood, Buffer OverFlow, ICMP Attack’s, Electrical disturbances, Attacks on a System’s Physical Environment.
4 examples of Wireless attacks:
Rogue Access Point, Evil Twin, War Driving, Deauthentication.
Two Categories of DoS Attacks:
Reflective, amplified.
What are two variants of ICMP DoS Attacks?
Ping of Death, Smurf attack
6 Electrical disturbances:
Power Spikes, Electrical Surges, Power Fault, Blackout, Power Sag, Brownout
3 Environment factors that could be manipulated by an attacker:
Temperature, humidity, gas
A business should have a _______ and _______ plan in place so that, in the event of any type of downtime (due to an attack or natural disaster), the company can be back up and running to maintain its business
Disaster recovery, business continuity