Digital Infrastructure Attacks Flashcards
DOS denial of services
Is overwhelming system resources. Enables an attacker to make services unavailable for their intended use
Targetted attack
In this attack the attacker chooses a target for a specific objective. Generally influenced by the value of assets and or potential outcome
Poisoning
Is manipulating a trusted source of data (DNS). Enables an attacker to control the trusted source of data and redirect/manipulate actions
Opportunistic attack
In opportunistic attack the attacker takes advantage of a vulnerability of target
OT operation technology
Is focused on the use of hardware and software systems to monitor and control physical processes in industries settings (plants transportation system )
Amplification attack
The attacker uses an amplification factor in order to multiply its power. Example: use bonnets to launch ddos attack or spam campaigns
DDOs distributed denial of services
Overwhelming of system resources, resources are unavailable for their intended use. There is massive amount of requests. Amplification+ reflection technique’s used
Hijacking attack
Is intercepting communication between two or more systems. Enables attackers to eavesdrop, capture, manipulate and or reuse data packets
Typo squatting attack
In web hijacking attack is taking advantage of common typos create fraudulent domains
URL squatting attack
In web highjacking attack is registering or using an internet domain name belonging to someone else
Reflection attack
The attacker sends a large number of requests to a device with the victims IP address as the source address. Often used in conjunction with amplification attacks
MAC
Media access control
DNS
Domain name system
ARP cashe poisoning (Adres resolution protocol)
Using to redirect traffic to malicious host, or to stop traffic (poisoning attack)
DNS cache attack (domain/host name system)
Diverting website traffic to malicious site or diverting website traffic to non-existing site