Flashcard data - Brainscape (2)
DNS hijacking
An attack that infects an external DNS server with IP addresses pointing to malicious sites.
distributed denial of service (DDoS)
An attack that uses many computers to perform a DoS attack.
Sources of DDoS Attacks
(Network)
Computer
Desktop, laptop, tablet
Using Layer 3, it is designed to overwhelm web servers and networks
Sources of DDoS Attacks
(Application)
IoT devices
Baby camera monitors, garage door openers
Focuses on cloud-based resources
Sources of DDoS Attacks
Operational Technology (OT)
Endpoints that can be programmed and have an IP address
Automobiles, drones, robots
Using Layer 7, it targets infrastructures like an electrical power grid
Operational Technology (OT)
The source of a DDoS attack in which endpoints can be programmed and have an IP address.
PowerShell
A task automation and configuration management framework from Microsoft.
Visual Basic for Applications (VBA)
An eventdriven Microsoft programming language.
macros
A series of instructions that can be grouped together as a single command.
Due to the impact of macro malware, Microsoft has implemented several protections:
Protected View
Trusted Documents
Trusted Location