Common Security Breaches Flashcards
What is Cross-site scripting?
malicious scripts are injected into otherwise trusted websites.
an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end-user.
What is a SQL injection attacks?
The hacker inputs, or injects, malicious SQL code — a form of malware known as the payload — on the website and fools it into delivering that code to its database as a legitimate query.
What is a DOS attack
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
What is an example of a DOS attack
Buffer overflow
What is a buffer overflow?
an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations.
What is a man in a middle attack?
an eavesdropping attack where a hacker injects himself in the middle of a transfer of two legitimate users.
What are some types of Man in the Middle attacks?1
Spoofing
Email Hijacking
Stealing Browser Cookies
DNS poisoning
How do you detect MiTM attacks?
Packet analyzer like wire shark to inspect packets for interferences.
How to mitigate SQL attacks?
Back up from storage or using data correction analysis to inspect and replace certain values
How do you mitigate DDOS attacks?
by break up or deflecting the malicious traffic to the out layer of the network perimeter using a firewall tool
What is a DDOS attack?
disrupt the normal traffic of a targeted server or network