Cyber Attaks Flashcards

1
Q

Spoofing

A

An attack with the goal of gaining access to a target system through the use of a falsified identity. Spoofing can be used against IP addresses, MAC address, usernames, system names, wireless network SSIDs, email addresses, and many other types of logical identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

An attack that attempts to misdirect legitimate users to malicious websites through the abuse of URLs or hyperlinks in emails could be considered phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOS

A

A denial-of-service (DoS) attack is a network resource consumption attack that has the primary goal of preventing legitimate activity on a victimized system. Attacks involving numerous unsuspecting secondary victim systems are known as distributed denial-of-service (DDoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

virus

A

The computer virus is perhaps the earliest form of malicious code to plague security administrators. As with biological viruses, computer viruses have two main functions—propagation and destruction. A virus is a self-replicating piece of code that spreads without the consent of a user, but frequently with their assistance (a user has to click on a link or open a file).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

worms

A

Worms pose a significant risk to network security. They contain the same destructive potential as other malicious code objects with an added twist—they propagate themselves without requiring any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan

A

Named after the ancient story of the Trojan horse, the Trojan is a software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network. For example, ransomware often uses a Trojan to infect a target machine and then uses encryption technology to encrypt documents, spreadsheets and other files stored on the system with a key known only to the malware creator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On path attack

A

In an on-path attack, attackers place themselves between two devices, often between a web browser and a web server, to intercept or modify information that is intended for one or both of the endpoints. On-path attacks are also known as man-in-the-middle (MITM) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Side channel attack

A

A side-channel attack is a passive, noninvasive attack to observe the operation of a device. Methods include power monitoring, timing and fault analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advanced Persistent Threat

A

Advanced persistent threat (APT) refers to threats that demonstrate an unusually high level of technical and operational sophistication spanning months or even years. APT attacks are often conducted by highly organized groups of attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Insider Threat

A

Insider threats are threats that arise from individuals who are trusted by the organization. These could be disgruntled employees or employees involved in espionage. Insider threats are not always willing participants. A trusted user who falls victim to a scam could be an unwilling insider threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity or availability of the victim’s data, applications or operating system or otherwise annoying or disrupting the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A

Malware used for the purpose of facilitating a ransom attack. Ransomware attacks often use cryptography to “lock” the files on an affected computer and require the payment of a ransom fee in return for the “unlock” code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion Detection System

A

Intrusion detection is a specific form of monitoring that monitors recorded information and real-time events to detect abnormal activity indicating a potential incident or intrusion. An intrusion detection system (IDS) automates the inspection of logs and real-time system events to detect intrusion attempts and system failures. An IDS is intended as part of a defense-in-depth security plan. It will work with, and complement, other security mechanisms such as firewalls, but it does not replace them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host-Based Intrusion Detection System

A

A HIDS monitors activity on a single computer, including process calls and information recorded in system, application, security and host-based firewall logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network - Based Intrusion Detection System

A

A NIDS monitors and evaluates network activity to detect attacks or event anomalies. It cannot monitor the content of encrypted traffic but can monitor other packet details. A single NIDS can monitor a large network by using remote sensors to collect data at key network locations that send data to a central management console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Information and Event Management (SIEM)

A

The general idea of a SIEM solution is to gather log data from various sources across the enterprise to better understand potential security concerns and apportion resources accordingly.

17
Q

intrusion prevention system ips

A

An intrusion prevention system (IPS) is a special type of active IDS that automatically attempts to detect and block attacks before they reach target systems.

all traffic must pass through the IPS and the IPS can choose what traffic to forward and what traffic to block after analyzing it.

18
Q

Firewalls

A

all traffic must pass through the IPS and the IPS can choose what traffic to forward and what traffic to block after analyzing it.
at transport layer

19
Q

Anti virus

A

Antivirus systems try to identify malware based on the signature of known malware or by detecting abnormal activity on a system. This identification is done with various types of scanners, pattern recognition and advanced machine learning algorithms.