4.2 Compare and contrast common types of attacks. Flashcards

1
Q

Denial-of-service (DoS)

A

Denial-of-Service (DoS) refers to an attack aimed at making a network resource unavailable to its intended users by overwhelming it with a flood of illegitimate requests. The objective is to disrupt the normal functioning of a targeted server, service, or network by exhausting its resources, such as bandwidth, memory, or processing power. DoS attacks can take various forms, including simple flood attacks or more sophisticated methods that exploit vulnerabilities in network protocols.

For your exam, it’s important to recognize the key characteristics of DoS attacks, including their various types, such as flooding attacks, application-layer attacks, and resource exhaustion. Understanding the difference between a DoS attack and a Distributed Denial-of-Service (DDoS) attack, which involves multiple compromised systems working together to launch an attack, is crucial. Be prepared to discuss common mitigation strategies, such as rate limiting, traffic filtering, and using anti-DDoS services, as well as the potential impacts of a successful attack on an organization’s operations and reputation. Understanding the legal and ethical implications of DoS attacks is also relevant, as they are often considered illegal and can lead to severe penalties for perpetrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

distributed denial-of-service (DDoS)

A

Distributed Denial-of-Service (DDoS) is a type of cyberattack in which multiple compromised systems, often referred to as a botnet, are used to flood a target server, service, or network with an overwhelming amount of traffic. The primary goal of a DDoS attack is to disrupt the normal functioning of the targeted system, rendering it unavailable to legitimate users. DDoS attacks can take various forms, including volumetric attacks that consume bandwidth, protocol attacks that exploit weaknesses in network protocols, and application-layer attacks that target specific applications.

For the exam, it’s essential to understand the mechanics of DDoS attacks, including how they are launched and the technologies used to execute them, such as malware that infects devices and turns them into bots. Be familiar with the differences between DDoS and regular Denial-of-Service (DoS) attacks, noting that DDoS attacks involve multiple sources while DoS attacks originate from a single source. You should also know common mitigation strategies, such as using traffic analysis, rate limiting, and deploying specialized DDoS protection services. Understanding the potential impact of a successful DDoS attack on business operations, customer trust, and reputation is critical, as these attacks can lead to significant financial losses and disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Botnet/command and control

A

A botnet is a network of compromised computers or devices, often referred to as “bots” or “zombies,” that are controlled remotely by a cybercriminal. These devices can be infected with malware, allowing the attacker to manage them without the owner’s knowledge. The primary purpose of a botnet is to perform automated tasks on a large scale, often for malicious activities such as launching Distributed Denial-of-Service (DDoS) attacks, sending spam emails, stealing data, or executing other harmful operations.

For the exam, it’s crucial to understand the concept of command and control (C2 or C&C) within the context of botnets. The command and control server is the central point through which an attacker sends commands to the infected devices. This server facilitates communication between the attacker and the botnet, allowing the attacker to coordinate actions, deploy additional malware, or extract data. Familiarize yourself with common methods attackers use to establish command and control, such as using Internet Relay Chat (IRC), HTTP/HTTPS, or peer-to-peer networks to disguise the communication. Recognizing the signs of botnet activity, such as unusual network traffic or system performance issues, is important for effective threat detection and mitigation. Understanding the impact of botnets on network security and how to defend against them through techniques like intrusion detection systems, firewalls, and regular software updates is also essential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-path attack (previously known
as man-in-the-middle attack)

A

An on-path attack, previously known as a man-in-the-middle (MITM) attack, occurs when an attacker intercepts and alters communication between two parties without their knowledge. In this scenario, the attacker positions themselves between the sender and receiver, enabling them to eavesdrop, manipulate data, or inject malicious content into the communication stream. This type of attack can target various protocols, including HTTPS, HTTP, and others, making it a significant threat in network security.

For the exam, it’s important to recognize the methods used in on-path attacks. Attackers can utilize techniques such as ARP spoofing, where they send falsified Address Resolution Protocol (ARP) messages to link their MAC address with the IP address of a legitimate device. This allows the attacker to intercept traffic intended for that device. Another common method is using rogue access points to trick users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • DNS poisoning
A

DNS poisoning, also known as DNS spoofing, is a type of attack where an attacker manipulates the Domain Name System (DNS) cache to redirect users from legitimate websites to malicious ones. This occurs when the attacker alters the IP address associated with a domain name in a DNS resolver’s cache. As a result, users attempting to visit a legitimate website may be unknowingly sent to a fraudulent site, potentially leading to data theft or malware infection.

For the exam, you should understand the impact of DNS poisoning on network security. It can be used to facilitate phishing attacks, spread malware, or perform other malicious activities by tricking users into believing they are accessing a trusted site. Additionally, knowing how to prevent DNS poisoning is crucial. Techniques include using DNSSEC (Domain Name System Security Extensions) to authenticate DNS responses and implementing proper security measures on DNS servers to mitigate the risk of cache poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • VLAN hopping
A

VLAN hopping is a type of network attack where an attacker gains unauthorized access to multiple Virtual Local Area Networks (VLANs) by exploiting the way VLAN tagging is handled in switches. This attack typically involves two methods: switch spoofing and double tagging. In switch spoofing, the attacker tricks a switch into treating their device as a trunk port, allowing them to send traffic to all VLANs. In double tagging, the attacker sends a frame with two VLAN tags, where the outer tag is stripped off by the first switch, allowing the inner tag to reach another VLAN that the attacker should not access.

For the exam, you should know the potential risks associated with VLAN hopping, such as data breaches and unauthorized access to sensitive information. Understanding how to mitigate VLAN hopping is also important. This can be achieved by configuring switch ports properly, disabling unused ports, and limiting trunk ports to only trusted devices. Implementing proper VLAN segmentation and ensuring that only authorized users have access to specific VLANs will help secure the network against this type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • ARP spoofing
A

ARP spoofing is a technique used by attackers to associate their MAC address with the IP address of another host on the network, effectively allowing them to intercept, modify, or block communications between devices. This is accomplished by sending false Address Resolution Protocol (ARP) messages over the local network, which updates the target’s ARP table with the attacker’s MAC address. As a result, any traffic intended for the legitimate device is instead sent to the attacker.

For the exam, you should understand the implications of ARP spoofing, including its potential to facilitate man-in-the-middle attacks, data theft, or denial of service. It’s also important to recognize mitigation strategies, such as using static ARP entries for critical devices, implementing dynamic ARP inspection (DAI) on switches, and employing VLAN segmentation to reduce the attack surface. Monitoring network traffic for unusual ARP activity can also help in detecting and preventing ARP spoofing attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Rogue DHCP
A

Rogue DHCP refers to an unauthorized DHCP server that is set up on a network, often by an attacker, to distribute incorrect IP address configurations to clients. This can lead to various malicious outcomes, such as intercepting network traffic, conducting man-in-the-middle attacks, or denying legitimate users access to network resources. Rogue DHCP servers can assign IP addresses from the same subnet as the legitimate server but can also provide incorrect gateway and DNS server addresses, leading clients to route their traffic through the attacker’s device.

For the exam, it’s important to know how rogue DHCP servers can compromise network security. Understanding mitigation techniques is also essential. These include implementing DHCP snooping on switches to allow only trusted DHCP servers, regularly monitoring the network for unauthorized devices, and segmenting the network to limit the impact of potential rogue devices. Awareness of these strategies helps maintain the integrity of the DHCP service and protects against unauthorized network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rogue access point (AP)

A

A rogue access point (AP) is an unauthorized wireless access point that is connected to a network without the knowledge or approval of network administrators. These devices can be set up by malicious actors or even well-intentioned employees, often to bypass security measures or to provide network access in areas where it is not officially authorized. Rogue APs can lead to various security risks, including unauthorized access to sensitive data, man-in-the-middle attacks, and network breaches.

For the exam, it is crucial to recognize the potential dangers posed by rogue access points, such as data interception and network compromise. You should also be familiar with preventive measures to mitigate these risks. This includes implementing a robust wireless security policy, using network monitoring tools to detect unauthorized devices, and enforcing strict authentication methods for users connecting to the network. Awareness of these strategies can help secure the wireless environment and maintain overall network integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Evil twin

A

An evil twin is a type of Wi-Fi attack where a malicious actor sets up a rogue wireless access point that mimics a legitimate network. This access point typically uses the same SSID (network name) as the legitimate one, tricking users into connecting to it instead. Once connected, the attacker can intercept sensitive information, such as login credentials and personal data, or launch further attacks against the user’s device.

For the exam, it is important to understand how evil twin attacks exploit the trust users place in familiar network names. You should be aware of the signs of an evil twin, such as unexpected changes in network performance or security warnings about the network. To mitigate the risk of falling victim to an evil twin attack, users should verify the legitimacy of the network before connecting and use a VPN for an additional layer of security. Familiarity with these protective measures will help enhance awareness and security in wireless environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

Ransomware is a type of malicious software designed to block access to a computer system or data, typically by encrypting files, until a ransom is paid to the attacker. Once the ransomware infects a device, it may display a message demanding payment in cryptocurrency in exchange for a decryption key. This payment does not guarantee that access will be restored, as some attackers may not provide the key or may demand further payments.

For the exam, it’s important to understand the mechanisms through which ransomware spreads, such as phishing emails, malicious downloads, or exploiting vulnerabilities in software. You should also be aware of the steps to take if infected, which include isolating the infected system, reporting the incident, and restoring data from backups. Preventative measures include keeping software up to date, using reputable security solutions, and educating users about safe browsing and email practices. Recognizing these aspects will help in understanding how to defend against ransomware threats effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password attacks - Brute-force

A

A brute-force attack is a method used to gain unauthorized access to a system by systematically trying every possible combination of passwords until the correct one is found. This type of attack relies on the computational power of the attacking machine, which can be either a single device or a botnet of multiple machines working together. Because brute-force attacks can potentially try every combination, they can be effective against weak passwords that lack complexity and length.

For the exam, it’s important to know that brute-force attacks can be mitigated through various strategies. These include implementing account lockout policies after a certain number of failed login attempts, using CAPTCHAs to differentiate between human users and automated attacks, and encouraging the use of strong, complex passwords that incorporate a mix of letters, numbers, and symbols. Additionally, organizations can deploy rate limiting on login attempts to slow down brute-force attempts and consider using multi-factor authentication (MFA) as an additional layer of security. Understanding these countermeasures will help in recognizing how to protect systems from brute-force attacks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password attacks - Dictionary

A

A dictionary attack is a method used to compromise passwords by systematically entering every word in a predefined list, often composed of commonly used passwords and words from the dictionary. This type of attack capitalizes on the tendency of users to choose simple, easily guessable passwords, such as “password,” “123456,” or “letmein.” Dictionary attacks are more efficient than brute-force attacks because they focus on probable passwords rather than every possible combination.

For the exam, it’s important to know that dictionary attacks can be countered by implementing strong password policies. This includes requiring passwords to have a minimum length, incorporating a mix of uppercase and lowercase letters, numbers, and special characters. Encouraging users to create complex passwords and using password managers to generate and store strong passwords can significantly reduce the risk of dictionary attacks. Additionally, organizations can deploy account lockout mechanisms after a certain number of failed login attempts to deter these types of attacks. Understanding these preventive measures will help in recognizing how to enhance password security effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • MAC spoofing
A

MAC spoofing is a technique used to change the Media Access Control (MAC) address of a network interface on a device. This is often done to disguise the identity of the device on the network or to bypass access control mechanisms that rely on MAC addresses for authentication. By altering the MAC address, a device can impersonate another device or evade security measures designed to restrict network access based on predefined MAC addresses.

For the exam, it’s essential to understand that MAC spoofing can pose security risks, such as unauthorized access to a network or the ability to intercept data meant for another device. To mitigate these risks, organizations can implement security measures like port security on switches, which limits the number of MAC addresses allowed on a port, and network access control lists (ACLs) to monitor and restrict traffic based on MAC addresses. Additionally, using encryption protocols like WPA2 for wireless networks can help protect against MAC spoofing by securing the data transmission, regardless of the device’s MAC address. Recognizing the implications of MAC spoofing and the strategies to prevent it is crucial for maintaining network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • IP spoofing
A

IP spoofing is a technique where an attacker sends IP packets from a false (or “spoofed”) source address to disguise their identity or to impersonate another device. This is commonly used in various types of attacks, including denial-of-service (DoS) attacks, where the attacker floods a target with requests from numerous IP addresses to overwhelm it. By masking their true IP address, the attacker can evade detection and complicate the process of tracing the attack back to its source.

For the exam, it’s important to know that IP spoofing can facilitate several security threats, such as session hijacking, where an attacker takes control of a user session by exploiting the trust established between devices. To mitigate these risks, network administrators can employ strategies such as ingress and egress filtering, which inspect packets at the network boundary to ensure that incoming and outgoing traffic has valid source addresses. Implementing strong authentication methods and encryption can also help protect against the effects of IP spoofing, as they reduce the likelihood of successfully impersonating a legitimate device. Understanding IP spoofing and its potential implications is crucial for maintaining the integrity and security of network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Deauthentication
A

Deauthentication is a process in wireless networks that involves the termination of a client’s association with an access point (AP). When a client device, such as a laptop or smartphone, connects to a Wi-Fi network, it is authenticated and granted access. If the AP sends a deauthentication frame to the client, the client is effectively disconnected from the network. This process can be legitimate, such as when a user logs out or moves out of range. However, it can also be exploited in attacks, such as deauthentication attacks, where an attacker intentionally sends deauthentication frames to disrupt a user’s connection to the network.

For your exam, it’s important to recognize that deauthentication attacks can be used to force clients to reconnect to an AP, which can then allow the attacker to capture sensitive information during the authentication process. Understanding the legitimate uses of deauthentication, as well as its potential for exploitation, is essential for network security. Effective countermeasures include using stronger encryption methods, implementing security protocols like WPA3, and monitoring for unusual deauthentication frames that may indicate malicious activity. Knowledge of deauthentication and its implications will help you assess security risks and apply appropriate safeguards in wireless networking environments.

17
Q

Malware

A

Malware, short for malicious software, refers to any software specifically designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or devices. It encompasses a wide range of harmful software types, including viruses, worms, Trojans, ransomware, spyware, adware, and rootkits. Each type of malware operates differently and may have various objectives, such as stealing sensitive data, encrypting files for ransom, or creating backdoors for further attacks.

For the exam, it’s important to understand the different types of malware and their characteristics. Recognizing how malware spreads—through phishing emails, infected downloads, or compromised websites—is crucial. You should also be aware of common defenses against malware, such as antivirus software, firewalls, and regular system updates, as well as the importance of user education in identifying suspicious activity. Additionally, knowing how malware can be categorized based on its function and the impact it can have on an organization’s security posture will aid in your understanding of network security fundamentals.

18
Q

Social engineering

A

Social engineering is a manipulation technique that exploits human psychology to gain confidential information, access, or valuables from individuals or organizations. Unlike traditional hacking methods that target system vulnerabilities, social engineering relies on tricking people into breaking normal security procedures. Common tactics include phishing, where attackers impersonate trusted entities via email or messages to extract sensitive data like passwords and credit card numbers. Other methods may involve pretexting, baiting, or tailgating.

For the exam, you should understand the various types of social engineering attacks and their tactics. It’s important to recognize the signs of social engineering attempts, such as unsolicited requests for information or pressure to act quickly without verifying the source. Additionally, be familiar with prevention strategies, which include user education, training employees to recognize suspicious behavior, implementing strict verification procedures, and establishing clear communication protocols. Understanding social engineering is vital in developing a comprehensive approach to cybersecurity and protecting sensitive information from manipulation.

19
Q

Phishing

A

Phishing is a type of cyber attack that attempts to deceive individuals into revealing sensitive information, such as usernames, passwords, and credit card numbers, by masquerading as a trustworthy entity. Attackers often use email or messaging platforms to send fraudulent messages that appear to come from legitimate organizations, such as banks, social media platforms, or popular online services. These messages typically contain links to counterfeit websites that closely resemble the actual sites, prompting victims to input their confidential information.

For the exam, it’s essential to understand the different types of phishing attacks, including spear phishing, which targets specific individuals or organizations, and whaling, which targets high-profile figures like executives. Recognizing the signs of phishing attempts, such as poor grammar, suspicious URLs, and urgent calls to action, is crucial for prevention. Familiarity with preventive measures is also important, such as training users to identify phishing emails, employing email filtering solutions, and implementing two-factor authentication to enhance security. Knowing about phishing is key to maintaining cybersecurity and protecting personal and organizational data from unauthorized access.

20
Q

Tailgating

A

Tailgating, also known as “piggybacking,” is a physical security breach where an unauthorized individual gains access to a restricted area by closely following an authorized person through a secure entrance. This method exploits social trust, as the unauthorized individual relies on the authorized person to swipe their access card or open a door without questioning their presence. Tailgating can occur in various settings, such as office buildings, data centers, or secure facilities.

For the exam, it is important to understand the risks associated with tailgating, including potential theft of sensitive information, unauthorized access to secure systems, and physical security breaches that can lead to larger security incidents. Recognizing preventive measures is also essential. These measures may include implementing access control systems, educating employees about security protocols, using security personnel to monitor entry points, and installing physical barriers to deter unauthorized access. Awareness of tailgating helps strengthen overall security policies and protect against unauthorized entry.

21
Q

Piggybacking

A

Piggybacking, similar to tailgating, is a security risk where an unauthorized person gains access to a secured area by closely following an authorized individual. However, unlike tailgating, piggybacking typically involves the authorized person knowingly allowing the unauthorized individual to enter. This may occur when an employee holds the door open for someone they believe is a colleague or when an employee is distracted and inadvertently permits access.

For the exam, it’s essential to understand that piggybacking poses significant security threats, including unauthorized access to sensitive areas, potential theft, and exposure to confidential information. Preventative measures include establishing strict access control protocols, using turnstiles or mantraps that only allow one person at a time, training employees to verify the identity of individuals requesting access, and implementing surveillance systems to monitor entry points. Understanding the distinction between piggybacking and tailgating is important, as both require different approaches to mitigation.

22
Q
  • Shoulder surfing
A

Shoulder surfing is a form of social engineering where an unauthorized person observes someone else’s private information, typically by watching them enter sensitive data like passwords or PINs on a device. This can occur in various settings, such as public places, offices, or even online, where the observer positions themselves close enough to view the target’s screen or keyboard without being noticed.

For the exam, it’s crucial to recognize that shoulder surfing can lead to identity theft, unauthorized access to accounts, and data breaches. Preventive measures include using privacy screens on devices to limit viewing angles, being mindful of surroundings when entering sensitive information, and encouraging users to shield their screens or keyboards from prying eyes. Understanding shoulder surfing as a security threat is vital, as it highlights the importance of maintaining privacy and security in both physical and digital environments.