8.1.3- Technical Threats 2 Flashcards
What is a botnet?
A network of computers or devices infected with malware, known as ‘bots’ or ‘zombies’, which are remotely controlled by the attacker without the owner’s knowledge, and can be used to launch DDoS attacks, spread malware, or steal sensitive information.
What are the impacts of a botnet and how can it be prevented?
Significant damage by disrupting services, stealing data, or conducting large-scale attacks on networks or websites, which can be prevented through security patches, reputable antivirus software, intrusion detection systems and more.
What is a distributed denial-of-service attack?
(DDos)
When a hacker maliciously overwhelms a server or network with thousands of fake requests using botnets to increase traffic, using up the server’s resources so it slows down and eventually crashes, making it inaccessible to legitimate users
What is an API and an insecure Application Programming Interface (API)?
An API is a set of rules and protocols that allow different software applications to communicate and interact with each other, while an insecure API lacks proper security measures making it easier for attackers to exploit vulnerabilities like insufficient authentication methods or insecure data transmission, to launch attacks like injection attacks or authentication bypass.
What are the impacts of an insecure API and how can it be prevented?
Data breaches, unauthorized access, financial losses, damage to reputation and legal liabilities, which can be prevented through strong authentication methods, input data validation, data encryption during transmission and more.
What is an ad hoc?
An open network that lacks proper security measures and encryption methods, like public Wi-Fi hotspots or unsecured wireless networks, making it easier to exploit vulnerabilities to intercept network traffic, or launch man-in-the-middle attacks
What are the impacts of an ad hoc and how can it be prevented?
Exposing users to risks like data interception, unauthorized access to sensitive information, identity theft, and malware infections, which can be prevented through VPNs for secure communication, not transmitting sensitive information over unencrypted connections, and enabling firewall and antivirus protection on devices.
What are the impacts of a DDoS attack and how can it be prevented?
Downtime, loss of revenue, damage to reputation, and disruption of services for businesses and organizations, which can be prevented through DDoS preventive solutions like traffic filtering, and content delivery networks to absorb excess traffic