2.4 Threats and Vulnerabilites Flashcards
Explain common social-engineering attacks, threats, and vulnerabilities
Phishing
Fake emails/texts sent by an attacker attempting to obtain confidential information from victims
Vishing
Fraudulent phonecalls used to trick victims into providing sensitive information
Shoulder surfing
Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information
Whaling
Spear-fishing attack aimed exclusively at a high-level executive or official
Tailgating
An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials
Impersonation
A criminal poses as a known person or organisation to steal confidential data or money
Dumpster diving
Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets
Evil twin
Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network
What information can attackers gather from deploying an evil twin attack?
Network traffic, private login credentials, financial data and credit card transactions
DDoS attack
Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests
DoS attack
Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system
Zero-day attack
Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited
Spoofing
Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source
On-path attack
An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)
Brute-force attack
Using many attempts to try and crack passwords, login credentials, and encryption keys
Dictionary attack
Attempting to crack a password with a “dictionary list” of common words and phrases
Insider threat
Any person with authorised access that causes harm (wittingly or unwittingly) to an organisation and/or it’s resources
SQL injection
A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database
Cross-site scripting
Malicious executable scripts are injected into the code of
otherwise benign and trusted websites
Non-compliant system
A system that does not comply with the required security criteria
Name three security vulnerabilities caused by BYOD.
- Devices can easily go missing (loss/theft)
- Shadow IT: Employees can download apps to improperly access company data or exploit/introduce security vulnerabilities
- Unsecured Wi-Fi access in public places
Name three security vulnerabilities caused by EOL OSs.
- Lacking latest security patches so increased vulnerability to cyberattacks
- May be non-compliant with regulatory standards
- Software incompatibility
Name three security vulnerabilities caused by unprotected systems
- Viruses and malware can be transmitted much easier
- Websites are unsecure and are easier to be compromised
- Attackers can gain access to the network and therefore sensitive information
Define what constitutes an unprotected system
Missing antivirus and/or a firewall