2.4 Threats and Vulnerabilites Flashcards
Explain common social-engineering attacks, threats, and vulnerabilities
Phishing
Fake emails/texts sent by an attacker attempting to obtain confidential information from victims
Vishing
Fraudulent phonecalls used to trick victims into providing sensitive information
Shoulder surfing
Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information
Whaling
Spear-fishing attack aimed exclusively at a high-level executive or official
Tailgating
An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials
Impersonation
A criminal poses as a known person or organisation to steal confidential data or money
Dumpster diving
Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets
Evil twin
Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network
What information can attackers gather from deploying an evil twin attack?
Network traffic, private login credentials, financial data and credit card transactions
DDoS attack
Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests
DoS attack
Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system
Zero-day attack
Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited
Spoofing
Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source
On-path attack
An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)
Brute-force attack
Using many attempts to try and crack passwords, login credentials, and encryption keys
Dictionary attack
Attempting to crack a password with a “dictionary list” of common words and phrases
Insider threat
Any person with authorised access that causes harm (wittingly or unwittingly) to an organisation and/or it’s resources
SQL injection
A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database
Cross-site scripting
Malicious executable scripts are injected into the code of
otherwise benign and trusted websites
Non-compliant system
A system that does not comply with the required security criteria
Name three security vulnerabilities caused by BYOD.
- Devices can easily go missing (loss/theft)
- Shadow IT: Employees can download apps to improperly access company data or exploit/introduce security vulnerabilities
- Unsecured Wi-Fi access in public places
Name three security vulnerabilities caused by EOL OSs.
- Lacking latest security patches so increased vulnerability to cyberattacks
- May be non-compliant with regulatory standards
- Software incompatibility
Name three security vulnerabilities caused by unprotected systems
- Viruses and malware can be transmitted much easier
- Websites are unsecure and are easier to be compromised
- Attackers can gain access to the network and therefore sensitive information
Define what constitutes an unprotected system
Missing antivirus and/or a firewall
What is the weakest link in an organisation’s security?
End users
What is the response rate for phishing?
60-70%
Business Email Compromise (BEC)
When an attacker takes over a high-level executive’s account and orders employees to conduct tasks
Pharming
A two-step process:
- Attacker installs malicious code on victim’s computer/server
- Victim is sent to a spoofed website where they may be tricked into revealing personal or sensitive information
Spam
Abuse of electronic messaging systems, most commonly through email
Open mail relay
SMTP server configured to allow anyone on the internet to send email through
Social engineering
Any attempt to manipulate users into revealing confidential information or performing other actions detrimental to the user or security of the systems
Tailgating
Attempting to enter a secure portion of a building by following an authorised person into that area without their knowledge
Piggybacking
Gaining access to a secure area by following an authorised person with their knowledge and consent
Shoulder surfing
Using direct observation to obtain information from an employee
Dumpster diving
Looking in garbage or recycling bins for personal or confidential information
Evil twin
A fraudulent WiFi access point that appears legitimate but collects data that victims send through wireless communications
Karma attack
Exploits the behaviour of WiFi devices due to a lack of access point authentication protocols being implemented
Preferred Network List
A list of the SSIDs (and their original settings) of any access point the device has previously
connected to and will automatically connect to when those
networks are in range
Captive portal
A web page that the user of a public network is required to view and interact with before accessing the network
Clean desk policy
Employees leave nothing on their desks at the end of the day that could be taken as a password or PIN