2.4 Threats and Vulnerabilites Flashcards

Explain common social-engineering attacks, threats, and vulnerabilities

1
Q

Phishing

A

Fake emails/texts sent by an attacker attempting to obtain confidential information from victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vishing

A

Fraudulent phonecalls used to trick victims into providing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder surfing

A

Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

Spear-fishing attack aimed exclusively at a high-level executive or official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tailgating

A

An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

A criminal poses as a known person or organisation to steal confidential data or money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A

Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twin

A

Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What information can attackers gather from deploying an evil twin attack?

A

Network traffic, private login credentials, financial data and credit card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS attack

A

Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DoS attack

A

Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-day attack

A

Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-path attack

A

An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute-force attack

A

Using many attempts to try and crack passwords, login credentials, and encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dictionary attack

A

Attempting to crack a password with a “dictionary list” of common words and phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Insider threat

A

Any person with authorised access that causes harm (wittingly or unwittingly) to an organisation and/or it’s resources

18
Q

SQL injection

A

A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database

19
Q

Cross-site scripting

A

Malicious executable scripts are injected into the code of
otherwise benign and trusted websites

20
Q

Non-compliant system

A

A system that does not comply with the required security criteria

21
Q

Name three security vulnerabilities caused by BYOD.

A
  • Devices can easily go missing (loss/theft)
  • Shadow IT: Employees can download apps to improperly access company data or exploit/introduce security vulnerabilities
  • Unsecured Wi-Fi access in public places
22
Q

Name three security vulnerabilities caused by EOL OSs.

A
  • Lacking latest security patches so increased vulnerability to cyberattacks
  • May be non-compliant with regulatory standards
  • Software incompatibility
23
Q

Name three security vulnerabilities caused by unprotected systems

A
  • Viruses and malware can be transmitted much easier
  • Websites are unsecure and are easier to be compromised
  • Attackers can gain access to the network and therefore sensitive information
24
Q

Define what constitutes an unprotected system

A

Missing antivirus and/or a firewall

25
What is the weakest link in an organisation's security?
End users
26
What is the response rate for phishing?
60-70%
27
Business Email Compromise (BEC)
When an attacker takes over a high-level executive's account and orders employees to conduct tasks
28
Pharming
A two-step process: - Attacker installs malicious code on victim's computer/server - Victim is sent to a spoofed website where they may be tricked into revealing personal or sensitive information
29
Spam
Abuse of electronic messaging systems, most commonly through email
30
Open mail relay
SMTP server configured to allow anyone on the internet to send email through
31
Social engineering
Any attempt to manipulate users into revealing confidential information or performing other actions detrimental to the user or security of the systems
32
Tailgating
Attempting to enter a secure portion of a building by following an authorised person into that area without their knowledge
33
Piggybacking
Gaining access to a secure area by following an authorised person with their knowledge and consent
34
Shoulder surfing
Using direct observation to obtain information from an employee
35
Dumpster diving
Looking in garbage or recycling bins for personal or confidential information
36
Evil twin
A fraudulent WiFi access point that appears legitimate but collects data that victims send through wireless communications
37
Karma attack
Exploits the behaviour of WiFi devices due to a lack of access point authentication protocols being implemented
38
Preferred Network List
A list of the SSIDs (and their original settings) of any access point the device has previously connected to and will automatically connect to when those networks are in range
39
Captive portal
A web page that the user of a public network is required to view and interact with before accessing the network
40
Clean desk policy
Employees leave nothing on their desks at the end of the day that could be taken as a password or PIN
41