2.4 Threats and Vulnerabilites Flashcards

Explain common social-engineering attacks, threats, and vulnerabilities

1
Q

Phishing

A

Fake emails/texts sent by an attacker attempting to obtain confidential information from victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vishing

A

Fraudulent phonecalls used to trick victims into providing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder surfing

A

Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

Spear-fishing attack aimed exclusively at a high-level executive or official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tailgating

A

An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

A criminal poses as a known person or organisation to steal confidential data or money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A

Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twin

A

Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What information can attackers gather from deploying an evil twin attack?

A

Network traffic, private login credentials, financial data and credit card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS attack

A

Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DoS attack

A

Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-day attack

A

Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-path attack

A

An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute-force attack

A

Using many attempts to try and crack passwords, login credentials, and encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dictionary attack

A

Attempting to crack a password with a “dictionary list” of common words and phrases

17
Q

Insider threat

A

Any person with authorised access that causes harm (wittingly or unwittingly) to an organisation and/or it’s resources

18
Q

SQL injection

A

A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database

19
Q

Cross-site scripting

A

Malicious executable scripts are injected into the code of
otherwise benign and trusted websites

20
Q

Non-compliant system

A

A system that does not comply with the required security criteria

21
Q

Name three security vulnerabilities caused by BYOD.

A
  • Devices can easily go missing (loss/theft)
  • Shadow IT: Employees can download apps to improperly access company data or exploit/introduce security vulnerabilities
  • Unsecured Wi-Fi access in public places
22
Q

Name three security vulnerabilities caused by EOL OSs.

A
  • Lacking latest security patches so increased vulnerability to cyberattacks
  • May be non-compliant with regulatory standards
  • Software incompatibility
23
Q

Name three security vulnerabilities caused by unprotected systems

A
  • Viruses and malware can be transmitted much easier
  • Websites are unsecure and are easier to be compromised
  • Attackers can gain access to the network and therefore sensitive information
24
Q

Define what constitutes an unprotected system

A

Missing antivirus and/or a firewall