1.8.1 Forms of Attack Flashcards
Passive attack
When a hacker eavesdrops on a network by ‘sniffing’ the data packets.
Active attack
When someone uses malware or other technical methods to compromise a network’s security.
Social engineering
When a person is exploited into giving away critical information that gives access to the network or accounts.
Insider attack
Insider attack
When someone in an organisation gives away access details or sensitive information.
Penetration testing
Penetration testing identifies vulnerabilities in a network’s security by attempting a controlled attack on the network.
This usually involves carrying out multiple types of attack to see which is most successful.
Penetration testing is done by the organisation itself, or an external organisation or contractor they have hired.
Good penetration testing
A good penetration test will check:
Technical vulnerabilities.
Likelihood of social engineering.
A test of damage recovery.
Motivation for penetration tests
Organisations choose to perform penetration testing to try to find vulnerabilities before criminals do.
If an organisation can find and fix a bug before it is exploited, it can save time and money.