Chapter 4 Mod2: Understand Network cyber threats and attacks Flashcards
What is the goal of an attack involving spoofing?
The goal of a spoofing attack is to gain access to a target system through the use of a falsified identity.
What types of logical identification can be targeted in a spoofing attack?
Spoofing can be used against IP addresses, MAC addresses, usernames, system names, wireless network SSIDs, email addresses, and many other types of logical identification.
What characterizes an attack that attempts to misdirect legitimate users to malicious websites?
An attack that attempts to misdirect legitimate users to malicious websites through the abuse of URLs or hyperlinks in emails could be considered phishing.
What is the primary goal of a denial-of-service (DoS) attack?
The primary goal of a denial-of-service (DoS) attack is to prevent legitimate activity on a victimized system by consuming its network resources.
What distinguishes distributed denial-of-service (DDoS) attacks from DoS attacks?
Attacks involving numerous unsuspecting secondary victim systems are known as distributed denial-of-service (DDoS) attacks.
What are the two main functions of a computer virus?
The two main functions of a computer virus are propagation and destruction.
How does a computer virus spread, and what is required for its propagation?
A computer virus is a self-replicating piece of code that spreads without the consent of a user, but frequently with their assistance. The user has to click on a link or open a file for the virus to propagate.
What distinguishes worms from other malicious code objects?
Worms pose a significant risk to network security with the same destructive potential as other malicious code objects, but they have an added twist—they propagate themselves without requiring any human intervention.
What is a notable characteristic of worms regarding their propagation?
Worms propagate themselves without requiring any human intervention, making them distinct from other forms of malicious code.
Why is a Trojan named after the ancient story of the Trojan horse?
A Trojan is named after the ancient story of the Trojan horse because it is a software program that appears benevolent but carries a malicious, behind-the-scenes payload.
Provide an example of how Trojans are commonly used in cyber attacks.
Ransomware often uses a Trojan to infect a target machine. The Trojan then uses encryption technology to encrypt documents, spreadsheets, and other files stored on the system with a key known only to the malware creator.
How do attackers position themselves in an on-path attack?
In an on-path attack, attackers place themselves between two devices, often between a web browser and a web server.
What is another term commonly used to refer to on-path attacks?
On-path attacks are also known as man-in-the-middle (MITM) attacks.
What characterizes a side-channel attack?
A side-channel attack is a passive, noninvasive attack aimed at observing the operation of a device.
What are some methods used in side-channel attacks?
Methods in side-channel attacks include power monitoring, timing analysis, and fault analysis attacks.
How is an Advanced Persistent Threat (APT) characterized?
APT refers to threats that demonstrate an unusually high level of technical and operational sophistication, spanning months or even years.
Who is typically behind APT attacks?
APT attacks are often conducted by highly organized groups of attackers.
What characterizes insider threats?
Insider threats arise from individuals who are trusted by the organization, and they may include disgruntled employees, employees involved in espionage, or even trusted users who fall victim to scams.
Are insider threats always willing participants?
No, insider threats are not always willing participants. A trusted user who falls victim to a scam could become an unwilling insider threat.
How is malware defined?
Malware is a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system, or otherwise annoying or disrupting the victim.
How is ransomware defined?
Ransomware is malware used for the purpose of facilitating a ransom attack. These attacks often use cryptography to “lock” the files on an affected computer and demand the payment of a ransom fee for the “unlock” code.
Does Intrusion Detection System (IDS) tools; Identify treats, Prevent treats of both?
Identify treats
Does Host-based IDS (HIDS) tools; Identify treats, Prevent treats of both?
Identify treats
Does Network-based IDS (NIDS) tools; Identify treats, Prevent treats of both?
Identify treats
Does SIEM tools; Identify treats, Prevent treats of both?
Identify treats
Does Anti-malware / Antivirus tools; Identify treats, Prevent treats of both?
Both
Does Scans; Identify treats, Prevent treats of both?
Identify treats
Does Firewall; Identify treats, Prevent treats of both?
Both