Chapter 14: Network Threats and Attacks Flashcards
Understand Network Threats and Attacks
{Blank} (or Malicious software) is one of the most significant threats to computer security. These objects infect computer systems and then perform some type of evil action: possibly stealing information, damanging data, or otherwise disrupting normal use of the system.
Malware
What are the two components does malware have?
- Propagation mechanism
- A payload
The {blank} is how the malware spreads from one system to another.
Propagation mechanism
The {blank} is the malicious action that the malware performs.
Payload
{Blank} spread between systems after a user action.
Viruses
{Blank} spread under their own power.
Worms
{Blank} pose as beneficial software with a hidden malicious effect.
Trojan Horses
On-path attacks take evesdropping to the next level by inserting an attacker in between the client and the server.
What are the two types of on-path attacks?
- Man-in-the-Middle (MitM)
- Man-in-the-Browser (MitB)
In a {blank} attack, the attacker tricks the sending syatem into communicating with the attacker, rather than the intended server. The user authenticates to the fake server set up by the attacker, and the attacker acts as a relay and can view all the communications that take place between the client and the server.
Man-in-the-Middle (MitM)
The {blank} attack is a variation on the man-in-the-middle attack, where the attacker compromises the user’s web browser or browser plugin or extension to gain access to web communication. The major difference is that the attacker isn’t present on a different network device from the user and server. The attacker is actually present on the user’s computer.
Man-in-the-Browser (MitB)
{Blank} attacks send unwanted traffic from a single attacker system to a victim server, overwhelming it with requests.
Denial-of-Service (DoS)
{Blank} attacks use a botnet to send the traffic from many different sources.
Distributed Denial-of-Service (DDoS)
Kim is the system administrator for a small business network that is experiencing securoty problems. She is in the office one evening working on the problem, and nobody else is there. As she is watching, she can see that systems on the other side of the office that were previously behaving normally are now exhibiting signs of infection one after the other. Which type of malware is Kim likely dealing with?
A. Virus
B. Worm
C. Trojan Horse
D. Logic bomb
Worm
Which one of the following statements about denial-of-service (DoS) attacks is incorrect?
A. They originate from many different sources.
B. They can disrupt the availability of systems.
C. They require large amounts of bandwidth.
D. They are easily detectible.
They originate from many different sources.