2.4 Threats and Vulnerabilites Flashcards

Explain common social-engineering attacks, threats, and vulnerabilities

1
Q

Phishing

A

Fake emails/texts sent by an attacker attempting to obtain confidential information from victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vishing

A

Fraudulent phonecalls used to trick victims into providing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder surfing

A

Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

Spear-fishing attack aimed exclusively at a high-level executive or official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tailgating

A

An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

A criminal poses as a known person or organisation to steal confidential data or money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A

Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twin

A

Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What information can attackers gather from deploying an evil twin attack?

A

Network traffic, private login credentials, financial data and credit card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS attack

A

Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DoS attack

A

Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-day attack

A

Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-path attack

A

An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute-force attack

A

Using many attempts to try and crack passwords, login credentials, and encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dictionary attack

A

Attempting to crack a password with a “dictionary list” of common words and phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Insider threat

A

Any person with authorised access that causes harm (wittingly or unwittingly) to an organisation and/or it’s resources

18
Q

SQL injection

A

A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database

19
Q

Cross-site scripting

A

Malicious executable scripts are injected into the code of
otherwise benign and trusted websites

20
Q

Non-compliant system

A

A system that does not comply with the required security criteria

21
Q

Name three security vulnerabilities caused by BYOD.

A
  • Devices can easily go missing (loss/theft)
  • Shadow IT: Employees can download apps to improperly access company data or exploit/introduce security vulnerabilities
  • Unsecured Wi-Fi access in public places
22
Q

Name three security vulnerabilities caused by EOL OSs.

A
  • Lacking latest security patches so increased vulnerability to cyberattacks
  • May be non-compliant with regulatory standards
  • Software incompatibility
23
Q

Name three security vulnerabilities caused by unprotected systems

A
  • Viruses and malware can be transmitted much easier
  • Websites are unsecure and are easier to be compromised
  • Attackers can gain access to the network and therefore sensitive information
24
Q

Define what constitutes an unprotected system

A

Missing antivirus and/or a firewall

25
Q

What is the weakest link in an organisation’s security?

A

End users

26
Q

What is the response rate for phishing?

A

60-70%

27
Q

Business Email Compromise (BEC)

A

When an attacker takes over a high-level executive’s account and orders employees to conduct tasks

28
Q

Pharming

A

A two-step process:
- Attacker installs malicious code on victim’s computer/server
- Victim is sent to a spoofed website where they may be tricked into revealing personal or sensitive information

29
Q

Spam

A

Abuse of electronic messaging systems, most commonly through email

30
Q

Open mail relay

A

SMTP server configured to allow anyone on the internet to send email through

31
Q

Social engineering

A

Any attempt to manipulate users into revealing confidential information or performing other actions detrimental to the user or security of the systems

32
Q

Tailgating

A

Attempting to enter a secure portion of a building by following an authorised person into that area without their knowledge

33
Q

Piggybacking

A

Gaining access to a secure area by following an authorised person with their knowledge and consent

34
Q

Shoulder surfing

A

Using direct observation to obtain information from an employee

35
Q

Dumpster diving

A

Looking in garbage or recycling bins for personal or confidential information

36
Q

Evil twin

A

A fraudulent WiFi access point that appears legitimate but collects data that victims send through wireless communications

37
Q

Karma attack

A

Exploits the behaviour of WiFi devices due to a lack of access point authentication protocols being implemented

38
Q

Preferred Network List

A

A list of the SSIDs (and their original settings) of any access point the device has previously
connected to and will automatically connect to when those
networks are in range

39
Q

Captive portal

A

A web page that the user of a public network is required to view and interact with before accessing the network

40
Q

Clean desk policy

A

Employees leave nothing on their desks at the end of the day that could be taken as a password or PIN

41
Q
A