Chapter 14 - Network Threats and Mitigation Flashcards
it prevents users from accessing the
network and/or its resources.
Denial of Service (DoS)
used to see whether a computer is responding to IP requests.
The Ping of Death
version of a DoS attack that floods its victim with spoofed broadcast ping messages.
Smurf
DoS attack that inundates the receiving machine with
lots of meaning-less packets.
SYN Flood
they initiate synchronized DoS attacks from multiple sources and
can target multiple devices.
Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K)
are basically little programs that can display a
message, delete files, or even send out huge amounts of meaningless data over a network to block legitimate messages.
Viruses
do their damage by replacing some or all of the
targetprogram’s code with their own. Executable on files ending in
.COM, .EXE, and .DLL.
File Viruses
automatically carry out tasks without requiring a
user to initiate them, usually harmless. (i.e. Visual Basic macro-
scripting)
Macro Viruses
overwrite your boot sector, making it
appear as if there’s no pointer to your operating system. Missing
Operating System or Hard Disk Not Found error message.
Boot-Sector Viruses
affects both the boot sector and files (i.e.Anthrax and Tequila)
Multipartite Viruses
fake source address packets.
IP Spoofing
holes in software that’s running on our
servers.
Application-Layer Attacks
miniature programs contain viruses, or snoop, or spyware programs.
Active-X Attacks
a rootkit to probe, scan, and then capture data.
Autorooters
hacker can use their previously placed inroads into a
specific host or a network whenever they want to.
Backdoors
Hackers gather info on a network
before attacking.
Network Reconnaissance
capture network traffic, including sensitive data
like passwords.
Packet Sniffers
Hackers use various methods to steal
passwords.
Password Attacks
tries every possible password to gain
access.
Brute-Force Attacks
redirect network traffic to a
compromised system, bypassing firewalls.
Port-Redirection Attacks
exploit internal network trust to
access sensitive systems.
Trust-Exploitation Attacks
Intercepted data is read by a third
party during transmission.
Man-in-the-Middle Attacks
a lot like viruses—only worse, can actively replicate
without requiring you to do anything like open an infected file.
Worms
are unauthorized wireless networks set up within a secure network. These can be accidental or intentional. They pose a serious security risk, especially for man-in-the-middle attacks.
Rogue Access Points