5.13 Information System Attack Methods& Techniques Flashcards

1
Q

What is alteration attack ?

A

When unauthorised modification affect the integrity of the data/code. Cryptographic hash is a primary défense against alteration attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is botnets ?

A

A collection of compromised computers (called zombie computers) running software usually worms , Trojan horses or back doors. (Eg. DoS attacks, adware, spyware and spam)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Denial of Service (DoS) attack?

A

Attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. Eg. Buffer overflows, brute force, DDos, ping flood, teardrop attack etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Dial-in penetration attack/ war dialing ?

A

An intruder determine the dial phone nb ranges from an external sources (internet). Information can also be obtain using social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is eavesdropping ?

A

happen when cyber criminals or attackers listen in to network traffic traveling over computers, servers, mobile devices and Internet of Things (IoT) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is email attacks and techniques ?

A

Attack that occurs via emails: email bombing (abuser repeatedly send identical email to an address), spam, email spoofing, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is flooding ?

A

DoS attack that bring down a network/service by flooding it with a large amount of traffic. The host memory buffer is filled by flooding it with connection that cannot be completed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a buffer overflow ?

A

Consumes the available memory or CPU time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a interupt attack ?

A

When malicious action is performed by invoking the OS to execute a particular system call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is juice jacking ?

A

type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malicious code ?

A

Différent types:
Trojan > programs that are disguised as useful programs and once executed performs action that the user did not intend (eg opening ports etc)
Logic bomb > program that is triggered when certains condition, time or event occurs. They can also be used by admin to trap attacker (honey token) cos they look vulnerable
Trap (back) door > bits of code embedded in programs by programmers to quickly gain access during testing or debugging. Can be a security home if not removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is man in the middle attack ?

A

an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is masquerading ?

A

The intruder present an identity other than the original identity in order to gain access to data that cannot be accessed under the original identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is message modification ?

A

Capturing of a message and making unauthorised changes or deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is network analysis ?

A

Gathering information on an organisation’s network to reveal vulnerability (known as footprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is packet replay ?

A

The intruder passively captures a stream of packets as the stream moves along an unprotected network. These packet are then actively inserted into the network as if the stream were another genuine message stream

17
Q

What is pharming ?

A

Attack that aime to redirect the traffic of a website to a bogus website. It can be done by changing the host’s file on a victim’s computer or by exploiting vulnerabilities in DNS

18
Q

What is piggybacking ?

A

Following an authorised person through a secured door, it is considered as physical access exposure

19
Q

What is Race conditions ?

A

Exploit a small window of time between the time that the security control is applied and the time that the service is used.

20
Q

What is remote maintenance tools attack ?

A

If not securely configured and controlled, can be used as an attack method by hacker to gain remote access

21
Q

What is resource enumeration and browsing ?

A

When the attacker list resources on target (directories, shares, names) etc