Domain 2 :Explain common threat vectors and attack surfaces Flashcards
SMS phishing (smishing)
uses text messages to deceive users into revealing personal information or downloading malicious attachments. The seemingly harmless SMS that arrives on your phone could hold the key to a breach.
IM Vun
IM vulnerabilities range from the distribution of malware-laden attachments to socially engineered messages that coax users into clicking malicious links.
Client based scanning
Client-based scanning (in which an agent resides on each host) operates as a tool for automating vulnerability discovery and classification, efficiently reporting to a central management server.
Agentless scanning:
On the flip side, agentless-based scanning, which is the preferred method for threat actors during reconnaissance, is employed to scan hosts without necessitating any installations. Examples of agentless-based scanning are Nmap and Wireshark.
Issues with Wireless networks
A wireless network using open system authentication lacks encryption. This means that any data exchanged between a guest’s device and a hotel’s network.
Ways to protect wireless networks
Strategies to protect wireless networks include using encryption and disabling the broadcast of the service set identifier (SSID), which acts as the network’s name. By disabling this broadcast, network administrators obscure the network’s presence, making it less visible to casual attackers. Another option is MAC filtering, which secures the network by ensuring that only an approved user’s MAC address is added to the wireless access point.
Wired Networks
Wired networks, which are often used by companies that rely on connectivity, harbor risks when left unsecured. Without proper encryption and access controls, unauthorized physical access to network ports can lead to data breaches and malware attacks. To preserve the integrity and reliability of these networks, implementing stringent access controls, encryption protocols, and consistent security assessments is crucial. We should also remove the patch cables for ports that are not being used.
Bluetooth
: A personal area network (PAN) is a Bluetooth network. Bluetooth features, such as easy pairing, can open the door to security breaches. While designed to simplify device connections, it can also inadvertently allow unauthorized access when left unchecked. To mitigate these risks, users must adopt a proactive stance by enabling Bluetooth only when actively needed to reduce the window of vulnerability. This simple step prevents devices from continuously broadcasting their presence and limits the opportunity for attackers to exploit easy pairing. Additionally, users should regularly update their devices with the latest security patches to close any potential vulnerabilities.
Supply Chain
A supply chain is the transformation of raw materials into finished products and making them available to consumers
Managed service providers
An MSP is a third-party organization that fulfills all of a company’s IT needs. A single compromise within an MSP’s infrastructure can ripple across multiple clients, leading to cascading breaches. To mitigate this risk, organizations should demand stringent security standards from their MSPs, including regular audits, robust access controls, and a commitment to promptly patch any vulnerabilities
Vendors Risks
The relationships between organizations and their vendors often involve the sharing of sensitive information. Yet, vendors can unwittingly serve as vectors for cyber threats. Organizations should implement comprehensive vendor risk assessments, evaluating security protocols and practices before granting access to their networks or data. Regular communication and collaboration ensure alignment in security expectations, minimizing the potential vulnerabilities introduced through vendor connections.
Suppliers risk
Suppliers, often referred to as third-party contributors who provide goods or services, are an integral part of the process but can also introduce risks. Therefore, it’s important to scrutinize suppliers’ security practices as part of a comprehensive supply chain risk management strategy.
Spear phishing
Spear phishing is a more targeted variant of phishing. It involves attacks directed at specific groups, such as the board of directors at a company. These emails are tailored to create a sense of authenticity and urgency, enticing the victim to click on a link embedded in the email, which typically leads to a malicious website or triggers a malware download.
Watering hole attacks
Watering hole attacks are like cunning predators lurking at watering holes in the wild. Cybercriminals compromise legitimate websites (knowing that users trust these sites) by implanting malicious code.
Typo squatting
Typosquatting exploits typing errors. Cyber attackers register domains that bear great similarity to legitimate domain names with minor changes such as spelling errors or missing symbols. They hope users will inadvertently recreate these domain names due to a typographical error. U