2.4 Threats and Vulnerabilites Flashcards
Explain common social-engineering attacks, threats, and vulnerabilities
Phishing
Fake emails/texts sent by an attacker attempting to obtain confidential information from victims
Vishing
Fraudulent phonecalls used to trick victims into providing sensitive information
Shoulder surfing
Attacker observing another person’s computer or mobile device screen and/or keyboard to obtain sensitive information
Whaling
Spear-fishing attack aimed exclusively at a high-level executive or official
Tailgating
An unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials
Impersonation
A criminal poses as a known person or organisation to steal confidential data or money
Dumpster diving
Extracting sensitive information and potential vulnerabilities from discarded physical or digital assets
Evil twin
Spoofing cyberattack that tricks users into connecting to a fake Wi-Fi AP mimicking a legitimate network
What information can attackers gather from deploying an evil twin attack?
Network traffic, private login credentials, financial data and credit card transactions
DDoS attack
Forcing a website, PC, or online service offline by flooding the target with requests from different IP addresses so it cannot respond to legitimate requests
DoS attack
Flooding a target with traffic (more TCP/UDP packets than it can process) from a single system
Zero-day attack
Where an unknown or unaddressed security flaw in software, hardware, or firmware is exploited
Spoofing
Attempting to obtain personal information by pretending to be a known, trusted, and/or legitimate source
On-path attack
An attacker places themselves between two devices and can intercept or modify communications (including impersonating as either agent)
Brute-force attack
Using many attempts to try and crack passwords, login credentials, and encryption keys
Dictionary attack
Attempting to crack a password with a “dictionary list” of common words and phrases