{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Cyber Attacks Flashcards

(11 cards)

1
Q

Wiretapping

A

Attacker eavesdrops on a network to acquire information normally at physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port scanning

A

When an attacker uses a software like nmap that sends thousand of tcp/ip packets to well known ports to see if they’re open and tells a hacker what service or app is running on a system. This can be stopped by packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP poisoning

A

Used to manipulate arp cache system mapping of MAC addresses
They send incorrect MAC addresses to a system
Tricks a switch into redirecting traffic to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man in the middle

A

Impersonate both the sender and the receiver intercepting all traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ping of death

A

Attacker sends an icmp packet that’s too large and causes the system to crash or stop functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ping flood

A

Attacker overwhelms victims computer with a large amount of icmp echos or ping request to overload, crash or slow down the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smurf attack

A

A DDOS ATTACK that is sent to a broadcast ip address connected to all the computers on a network. The attacker spoofs the return address to the victim. The victim is bombarded with reply’s from other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mitigate ddos attacks

A

Packet filtering firewall that blocks icmp packets over a certain number of block all icmp packets together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL injection

A

An attacker is trying to obtain info from or take over a database
They enter sql commands into input boxes instead of basic text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflow

A

When an attacker enters text that is too large to fit within a region of memory called a buffer allowing the attacker to retrieve it from a different region in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet

A

Malware that can takeover a pc allowing it to be remotely controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly