GCGA Ch. 7 Protecting Against Advanced Attacks Flashcards

1
Q

DDoS attacks

A

Denial of Service (DoS) attacks from multiple computers. Distributed Denial of Service (DDoS) attacks typically include sustained, abnormally high network traffic, high processor usage, or high memory usage resulting in resource exhaustion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Major variants of DDoS attacks

A

include reflected attacks, which involve using third-party servers to redirect traffic to the target, and amplified attacks, which combine reflection techniques with amplification to generate an even greater volume of traffic directed at the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Forgery attacks

A

occur when an attacker creates a fake identity, certificate, file, or other object in an attempt to fool an unsuspecting user or system. Spoofing is an example of forgery that occurs when one person or entity impersonates or masquerades as someone or something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-path attacks

A

a form of interception or active eavesdropping. Sophisticated on-path attacks establish secure channels and users may see certificate warnings indicating an on-path attack. SSH will give users a warning if it detects a man-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Sockets Layer (SSL) stripping

A

an on-path attack that attempts to convert encrypted HTTPS sessions into unencrypted HTTP sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS poisoning attacks

A

corrupt or modify DNS data stored on a DNS server and can redirect users to malicious sites. A pharming attack attempts to manipulate the DNS name resolution process by storing incorrect DNS records on a client system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

URL redirection

A

causes a web browser to go to a different URL when a user visits a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domain hijacking attacks

A

allow an attacker to change a domain name registration without permission from the owner. Owners learn of the hijack after they’ve lost access to the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replay attacks

A

capture data in a session. After manipulating the capture, they send it back on the network as a session replay. Timestamps and sequence numbers thwart replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Input validation

A

A common coding error in web-based applications is the lack of input validation. Input validation checks the data before passing it to the application and prevents many types of attacks, including buffer overflow, SQL injection, command injection, and cross-site scripting attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Server-side input validation

A

the most secure. Attackers can bypass client-side input validation but not server-side input validation. It is common to use both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Race conditions

A

allow two processes to access the same data at the same time, causing inconsistent results. Problems can be avoided by locking data before accessing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Error-handling

A

Error-handling routines within applications can prevent application failures and protect the integrity of the operating systems. Error messages shown to users should be generic, but the application should log detailed information on the error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code signing

A

uses a digital signature within a certificate to authenticate and validate software code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Code quality and testing techniques

A

include static code analysis, dynamic analysis (such as fuzzing), stress testing, sandboxing, and model verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL injection attacks

A

provide information about a database and can allow an attacker to read, modify, and delete data within a database. They commonly use the phrase ‘ or 1=1 to trick the database server into providing information. Input validation and stored procedures provide the best protection against SQL injection attacks.

17
Q

Secure cookies

A

have an attribute set that instructs web browsers to only send them over encrypted connections, protecting them from eavesdropping attacks.

18
Q

Buffer overflow

A

occurs when an application receives more input, or different input, than it expects. The result is an error that exposes system memory that would otherwise be protected and inaccessible.

19
Q

Directory traversal

A

a type of injection attack that attempts to access a file by including the full directory path or traversing the directory structure on a computer.

20
Q

XSS

A

Cross-site scripting (XSS) is a web application vulnerability that allows attackers to inject scripts into webpages

21
Q

Automation and orchestration techniques

A

allow IT and security teams to streamline processes, minimize human error, and ensure a consistent approach to managing various security-related tasks.

22
Q

Common use cases for automation and scripting in security operations

A

user provisioning, resource provisioning, guardrails, security groups, ticket creation, escalation, enabling/disabling services and access, continuous integration and testing, and the use of APIs to create integrations.

23
Q

The key benefits of automation and scripting in security operations & considerations

A

include improved efficiency and time saving, consistent enforcement of baselines, standardized infrastructure configurations, secure scaling, increased employee retention, faster reaction times, and serving as a workforce multiplier. When implementing automation and scripting in security operations, it is essential to consider the potential complexity, cost, single points of failure, technical debt, and ongoing supportability to ensure long-term success and maintainability.