A3 Flashcards
What is a covert channel?
A channel that is not known by the organization.
Mechanisms used to transmit data using methods not originally intended for data transmission by the system designers. These channels violate the entity’s security policy but do not exceed the entity’s access authorization, so they can communicate data in small parts
What is a replay attack?
Someone eavesdrops on someone, and they collect information that can later be used/replayed to gain access.
A type of man-in-the-middle (MITM) attack in which a cybercriminal eavesdrops on a secure network communication, intercepts it, and then “replays” the message at a later time to the intended target to gain access to the network and the data that is behind the firewall.
What is a return-oriented attack?
A gadget that is attached to the system and returns information once it is done.
A sophisticated technique that utilizes pieces of legitimate original system code (each a gadget) in a sequence to perform operations useful to the attacker. Each gadget ends with a “return” instruction causing the next gadget to execute and carry out complex operations.
What is race conditions?
They force an application to perform two operations at the same time so the program can freeze.
An attacker exploits a system or application that relies on a specific sequence of operations. By forcing the application to perform two or more operations out of order or simultaneously, an attacker may gain unauthorized access or execute a fraudulent act.
What is a state sponsored actor?
Someone funded by the nation to steel and exfiltrate intellectual property, sensitive information, and even funds to further their nation’s espionage causes.
What is Malware?
Software or firmware intended to perform unauthorized processes that have an adverse impact on the confidentiality, integrity, or availability of an information system. Common examples include viruses, worms, Trojan horses, adware, spyware, and other code-based programs that infect a host.
What is DNS spoofing?
A spoofing attack that involves a perpetrator modifying the domain-name-to-IP address mapping known as the Domain Name System (DNS).
What is Rogue mobile apps?
Malicious apps that appear legitimate. A fraudulent party creates a mobile application that is installed by a victim unsuspectingly and that app then steals information, gives the attacker unauthorized access, or executes some other malicious act.
What is spear phishing?
Social engineering attack in which employees in a corporate entity are targeted by posing as a legitimate department or employee, such as human resources or the IT director.
What is a mobile code cyberattack?
Software program designed to move from computer to computer to “infect” other applications by altering them in some way to include a version of the code. Malicious mobile code is often known as a virus, and a polymorphic virus is one such variety in which the code mutates by changing its structure to avoid detection.
What is denial of service attack?
A scheme in which cybercriminals flood a company’s network with so much traffic that it is unable to respond to service requests or sustain normal network operations. Excessive volume will prevent web servers from being able to support user requests on a web page, causing customers to be unable to navigate a company’s site or make purchases.
What is a Brute force attack?
Password-cracking scheme that involves an attacker using an automated program to guess a password.
What is a Port scanning attack?
Occurs when an attacker scans for open logical ports that can be used to find vulnerabilities or entry points into a company’s network.
What is ransomware?
An attack typically coming in the form of malware that locks a user or a company’s operating systems, applications, and ability to access data unless a ransom is paid.