1.4- Network Security Flashcards
Threats posed to devices/systems by viruses
Viruses attach themselves to legitimate programs or files and replicate when the infected program or file is executed. They can corrupt or delete files and spread to other programs or devices.
Threats posed to devices/systems by worms
Worms are self-replicating programs that spread across networks without requiring user interaction. They can consume network bandwidth, degrade system performance, and open backdoors for other malware.
Threats posed to devices/systems by trojans
Trojans disguise themselves as legitimate software but contain malicious code. They can perform various harmful activities, such as stealing sensitive information, providing unauthorized access to attackers, or enabling other malware.
Threats posed to devices/systems by ransomware
Ransomware encrypts files on a system, rendering them inaccessible. Attackers then demand a ransom for the decryption key. It can lead to data loss, financial damage, and operational disruption.
Threats posed to devices/systems by spyware
Spyware secretly monitors user activities, collects sensitive information, and transmits it to third parties. It can compromise user privacy, leading to identity theft or unauthorized access to personal data.
Threats posed to devices/systems by phishing
Phishing attacks involve fraudulent attempts to obtain sensitive information, such as usernames, passwords, or financial details. Attackers often use fake emails, websites, or messages that mimic legitimate entities to trick users into providing information.
Threats posed to devices/systems by spear fishing
Similar to phishing, spear phishing targets specific individuals or organizations. Attackers personalize their messages, making them more convincing and increasing the likelihood of success.
Threats posed to devices/systems by spear pretexting
Pretexting involves creating a fabricated scenario or pretext to trick individuals into providing information or performing actions. This could include impersonating a colleague, vendor, or authority figure to gain trust
Threats posed to devices/systems by spear baiting
Baiting involves offering something enticing, such as a free software download or a USB drive labeled as important, to lure individuals into taking actions that compromise security, like installing malware or disclosing sensitive information.
Threats posed to devices/systems by unauthorised access
The primary threat of a brute force attack is gaining unauthorized access to a system, application, or account by successfully guessing the correct password or encryption key.
Threats posed to devices/systems by compromised user accounts
If an attacker successfully guesses a user’s password, they can compromise the associated account, gaining control over sensitive information, personal data, or even financial resources.
Threats posed to devices/systems by data breaches
Brute force attacks can lead to data breaches, exposing sensitive information such as personal details, financial records, or intellectual property stored on the compromised system.
Threats posed to devices/systems by identity theft
Once an attacker gains unauthorized access, they may impersonate the legitimate user, leading to identity theft. This can result in financial losses, reputation damage, or legal consequences for the victim.
Threats posed to devices/systems by service disruption
The primary goal of a DoS attack is to disrupt the normal functioning of a targeted service or system, rendering it temporarily or permanently unavailable to legitimate users.
Threats posed to devices/systems by downtime
DoS attacks can lead to extended periods of downtime, impacting the availability of critical services, websites, or online platforms. This downtime can result in financial losses and damage to the organization’s reputation.
Threats posed to devices/systems by loss of productivity
Businesses and individuals relying on online services may experience a loss of productivity during a DoS attack, as they are unable to access essential tools, applications, or resources.
Threats posed to devices/systems by financial losses
Extended service disruption or downtime can lead to financial losses for businesses, especially e-commerce platforms, which may lose revenue during the period of unavailability.
Threats posed to devices/systems by unauthorised access
Attackers may intercept sensitive data during transmission, gaining unauthorized access to confidential information, login credentials, or financial details.
Threats posed to devices/systems by data eavesdropping
Cybercriminals may eavesdrop on communication channels, intercepting unencrypted data as it travels across networks. This can lead to the compromise of sensitive information.
Threats posed to devices/systems by credential theft
Attackers may intercept login credentials, such as usernames and passwords, during data transmission. Stolen credentials can be used for unauthorized access to accounts and systems.
Threats posed to devices/systems by financial fraud
Intercepted financial data, such as credit card information or banking details, can be exploited for financial fraud, leading to unauthorized transactions and monetary losses for individuals and organizations.
Threats posed to devices/systems by data disclosure
Attackers can exploit SQL injection vulnerabilities to extract sensitive data from databases, such as usernames, passwords, and personal information.
Threats posed to devices/systems by data manipulation
Malicious SQL statements can alter, add, or delete data within the database, leading to data manipulation and potential disruptions in business operations.
Threats posed to devices/systems by bypassing authentication
SQL injection can be used to bypass authentication mechanisms, granting unauthorized access to restricted areas of a website or application.
Threats posed to devices/systems by injection of malicious code
Attackers can inject malicious SQL code that may lead to the execution of additional code on the server, potentially compromising the entire system.
Malware penetration testing approach:
Conduct regular malware detection and removal tests.
Simulate malware attacks to identify weaknesses in endpoint protection.
Test email security measures to detect and prevent malware distribution.
Assess the effectiveness of antivirus and anti-malware solutions.