Digital Infrastructure Attacks Flashcards

1
Q

DOS denial of services

A

Is overwhelming system resources. Enables an attacker to make services unavailable for their intended use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Targetted attack

A

In this attack the attacker chooses a target for a specific objective. Generally influenced by the value of assets and or potential outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Poisoning

A

Is manipulating a trusted source of data (DNS). Enables an attacker to control the trusted source of data and redirect/manipulate actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Opportunistic attack

A

In opportunistic attack the attacker takes advantage of a vulnerability of target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OT operation technology

A

Is focused on the use of hardware and software systems to monitor and control physical processes in industries settings (plants transportation system )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Amplification attack

A

The attacker uses an amplification factor in order to multiply its power. Example: use bonnets to launch ddos attack or spam campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDOs distributed denial of services

A

Overwhelming of system resources, resources are unavailable for their intended use. There is massive amount of requests. Amplification+ reflection technique’s used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hijacking attack

A

Is intercepting communication between two or more systems. Enables attackers to eavesdrop, capture, manipulate and or reuse data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Typo squatting attack

A

In web hijacking attack is taking advantage of common typos create fraudulent domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

URL squatting attack

A

In web highjacking attack is registering or using an internet domain name belonging to someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reflection attack

A

The attacker sends a large number of requests to a device with the victims IP address as the source address. Often used in conjunction with amplification attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC

A

Media access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

Domain name system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP cashe poisoning (Adres resolution protocol)

A

Using to redirect traffic to malicious host, or to stop traffic (poisoning attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS cache attack (domain/host name system)

A

Diverting website traffic to malicious site or diverting website traffic to non-existing site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On-path hijacking

A

Exploiting real-time processing of transactions, conversations, or data transfer (men in the middle). Manipulating the browser to control a session including what is displayed (men in the the between)

17
Q

Session hijacking

A

Stealing session cookies to “take over” a users active session

18
Q

On-path attack

A

Manipulating the browser to control session including what is displayed