Common Security Attacks - Mitigation Flashcards

1
Q

Motivations behind attacks

A

Financial Gain
Disrupt Service by competitor, protestor, or for attention seeker
Geopolitical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering Attacks

A

Shoulder watching
Fake phone call
Phishing Mail
Lost USB left for someone to use. as a trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing Attack

A

Email
DNS(pharming)
Phone Calls
SMS messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defending Against Social/phishing attack

A

training, policies, simulations
anti-virus, firewalls, e-mail filters
web and email security(Cisco WSA & ESA)
endpoint security to restrict user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DOS(Denial of service) Attack

A

Massive amounts of requests sent to a server to tie up its resources. So legitimate users cannot access the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDOS(Distributed Denial of service) Attack

A

Attacker Zombies/Botnets to DOS attack simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDOS Attack Mitigations

A

Network/Application Firewalls

Resource Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing Attacks

A

Attacker fakes the identity of another device
MAC Spoofing
IP Spoofing
Application Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP Spoofing Mitigation

A

Infrastructure ACLs

URPF(Unicast Reverse Path Forwarding) to check if spoofed IPs match the routing table for incoming interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Man in the middle attacks

A

Both parties believe they are communicating with each other

ARP/IP/DHCP/DNS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reflector/Reflective Attack

A

Attack spoofs victim’s IP address. Attacker sends many DNS server requests, but the DNS server sends the replies to the IP of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Amplification Attack

A

Reflector attack but used with a botnet and multiple DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reconnaissance Attack

A

learning information about a target network.
os, services, ip addresses, vulnerabilities.
Probing to plan for future attacks.
CDP/LLDP, Ping sweeps, packet sniffers, port scan, internet information Queries(nslookup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mitigate Reconnaissance Attacks

A

Disable un-needed services
Application & Network firewalls as proxies(Firewall/IPS)
Two factor authentication
Encryption
Ant-sniffer tools to detect packet sniffer attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly