Identifying Security Threats And Vulnerabilities 2 Flashcards

0
Q

List types of social engineering

A

Spoofing. Impersonation. Hoax. Phishing. Vishing. Whaling. URL hijacking. Spam & slim. Shoulder surfing. Dumpster diving. Tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is a social engineer attack

A

A type of attack that uses deception to trick users into providing sensitive data or violating security guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A

Human based or software based social engineering attack. Goal is to pretend to be someone else for identity concealment. Can occur in IP Addresses, MAC Addresses, and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Impersonation

A

Human based social engineering attack where attacker pretends to be someone they are not. Successful in situations where identity cannot easily be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hoax

A

Email based or web based social engineering attack. Intended to trick the user to perform undesired actions or give up important information or money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Email based social engineering attack where attacker sends an email that seems to come from a respected institution. Wants the user to provide private information to verify an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A

Email based social engineering attack targeting specific individuals or institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

Similar to phishing social engineering attack but redirects a request for a website to a similar but fake site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

Human based social engineering attack where the goal is to extract personal private information using the phone system IP based voice messaging services such as VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whaling

A

social engineering attack a form of spear phishing that targets individuals of great wealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

URL hijacking

A

Also called typo squatting. Exploits typos that users sometimes make when entering a URL into a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spam and slim

A

social engineering Email based threat where the users inbox is flooded with emails that carry advertising material for products. Can sometimes deliver viruses or malware.
Slim attack is Similar to spam done through instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shoulder surfing

A

social engineering attack where an attacker looks over shoulder to get passwords and PIN numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dumpster diving

A

Social engineering attack where the goal is to get private information by inspecting the trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tailgating

A

Also called piggy backing. Human based social engineering attack where the attacker follows an employee through a secure area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a white hat hacker

A

Discovers and exposes security flaws in apps and OSs so that manufacturers can fix them Geoffrey becoming wide spread. Aka ethical hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a black hat hacker

A

Discovers and exposes security flaws for financial gain or malicious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a grey hat hacker

A

Discovers and publicizes security problems without the permission or knowledge of an organization. Moral intent is in question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why does social engineering work

A

Common and therefore successful. Exploits basic human trust, thought processes and behavior. Takes advantage of users who aren’t thinking critically or the human need to want to belong to groups and defer actions to the wisdom of crowds. The weakest link can compromise an entire system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Categories of attackers

A
Malicious insider
Electronic activists
Data thief
Script kiddie
Electronic vandal
Cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A malicious insider threat is

A

A threat originating from an employee in an organization who performs malicious acts. Fueled by resentment motivated by financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Electronic activist or hacktivist

A

Motivated by a desire to cause social change or promoting a message by replacing the info on public websites. Cause damage to organizations deemed socially irresponsible or unworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data thief

A

Blatantly steals resources or confidential information for personal or financial gain. Covers their tracks to avoid detection. Exploits unauthorized access or acts in collusion with a disgruntled employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Script kiddie

A

Aka Novice attacker has limited technical knowledge and motivated to gain and display skill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Electronic vandal

A

Attacker wants to cause as much damage as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cyberterrorist

A

Attacker tries to disrupt computer systems to spread fear and panic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Basic explanation of malware

A

Most prevalent threat to computers. Is insidious and difficult to remove. A collection of different methods that can exploit vulnerabilities in your information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A malicious code attack

A

A type of software attack where undesired software or malware is Inserted into a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some potential uses of malicious code

A

Denial of Service (DOS) attacks
Hosting illicit or illegal data
Skimming personal or business info for identity theft, profit, or extortion
Displaying unsolicited ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A virus is

A

A piece of code that spread from one computer to another by attaching itself to other files through self replication. Code executes when the attached file is opened and interferes with the functioning of the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a worm

A

Malware that replicates itself across the infected system. Does not attach itself to files. Intended to interrupt network capabilities. Primary function is to spread and cripple network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is adware

A

Malware that automatically displays or downloads unsolicited advertising when used. Appears as browser pop ups. Have been associated with spyware. Reduces productivity by slowing down systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is spyware

A

Malicious software intended to track and report the usage of a target system or collect other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Trojan horse

A

Or simply a Trojan is hidden malware that causes damage to a system or gives an attacker a platform for monitoring and controlling a system. Do not replicate themselves or attach to files. Usually propagated by social engineering when users download an email or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a rootkit

A

Malware code that is intended to take full or partial control of a system at the lowest levels. Hide themselves from monitoring or detection and modify low level system files when integrating into system. most install backdoors or spyware,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a logic bomb

A

A malware piece of code that sits dormant on a target computer until it is triggered by a specific event. When detonates performs the programmed actions often includes erasing or corrupting data on target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a botnet

A

A set of computers that have been infected by a control program called a bot that enables attackers to exploit those computers to mount attacks. These infected machines are referred to as zombies or drones. Used to coordinate DoS attacks, send spam email and mine for private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is ransomware

A

Malware in which an attacker infects a victims computer with code that restricts access to the to computer and the data on it. Then the attacker demands ransom with the threat of destroying the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Polymorphic malware

A

Encrypted viruses that infect files with an encrypted copy of itself. The decryption module is altered each time the virus infects a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is an armored virus

A

Virus attempts to trick or shield themselves from antivirus software. Virus is able to obscure it’s true location in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A software attack is

A

Any attack against software resources. Goal is to disrupt or disable the software running on the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A password attack is

A

Attacker attempts to obtain and make use of passwords illegitimately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Types of password attacks

A
Guessing
Stealing 
Dictionary attack
Brute force attack 
Rainbow tables
Hybrid password attack
Birthday attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Guessing password attack is

A

Making individual repeated attempts to guess a password by entering different common password values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Brute force password attacks uses

A

Attacker uses password cracking software to attempt every possible alphanumeric combination. Most effective at cracking short passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Rainbow tables password attacks

A

Sets of related plaintext passwords and their hashes. Executed by comparing the target password hash to the password hashes stored in the tables then work backward to determine a girls password from known hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Backdoors attacks are

A

Type of software attack where an attacker creates software mechanism called backdoors to gain access to a computer. Typically delivered through a Trojan horse or other malware

47
Q

Takeover attacks

A

Backdoors attacks can be the first step in which an attacker assumes complete control over a system.

48
Q

Application attacks

A

Software attacks that are targeted at web based and other client server applications. Can lead to an authentication breach, customer impersonation, info disclosure, source code disclosure or tampering.

49
Q

A client side attack

A

An application attack that specifically exploits the trust between a user and a server.

50
Q

List types of application attacks

A
Cross-site scripting XSS
Command injection attacks
Zero day exploit
Cookie manipulation
Locally shared object LSO
Attachment attack
Malicious add-on
Header manipulation
Buffer overflow 
Integer overflow
Arbitrary code execution
51
Q

Four types of command injection attacks

A

SQL injection
LDAP injection
XML injection
Directory reversal

52
Q

SQL injection attack

A

Command injection attack that inject a structured query language SQL into the input data intended for the server by accessing the client side of the application. Exploits and reads or modifies data in the database or executes admin operations.

53
Q

LDAP injection attack

A

Command injection attack they targets web based applications by fabricating Lightweight Directory Access Protocol statements created by user input

54
Q

XML injection attack

A

Command injection attack that injects corrupted eXtensible Markup Language query data so an attacker can gain access to the XML data structure

55
Q

Directory traversal attack

A

A command injection attack that allows access to commands, files, and directories connected to the web document root directory. Affects http based interface

56
Q

Zero day exploit application attack

A

An attacks that occurs whe on the security level of a system is at its lowest immediately after the discovery of a vulnerability

57
Q

Cookie manipulation application attack

A

Attack injects a meta tag in an HTTP header making it possible to modify s cookie stored in a browser

58
Q

Locally shared object LSO application attacks

A

Aka flash cookies. Are data that is stored on a users computer by websites that use Adobe flash player. Even after wiping the browser it can remain

59
Q

Attachment application attack.

A

An attack where the attacker can merge malicious software into a downloadable file on a web server

60
Q

Malicious add on application attack

A

An add on that is meant to look normal except when Installed malicious content is injected to target security loop holes present in the web browser

61
Q

Header manipulation application attack

A

Am attack in which data goes past the boundary of the destination buffer and corrupts adjacent memory. Causes app to crash and reboot

62
Q

Integer overflow application attacks

A

An attack which a computed result is too large to fit its assigned storage space and may trigger a buffer overflow

63
Q

Arbitrary code execution application attack

A

Aka remote code execution. Exploits application vulnerabilities by allowing an attacker to execute any command on a victims machine.

64
Q

TCP/IP basics

A

Transmission Control Protocol/Internet Protocol
Standard network protocol used
Is a layered suite of many protocols
By adding header info to the data in a network packet a protocol at a given layer on the sending host can communicate with the protocol at the corresponding layer at the receiving host.

65
Q

The logical end points of a connection between hosts are called

A

Ports

66
Q

Each host on a TCP/IP network receives ______ & _______

A

Receives a numeric address and a descriptive address

67
Q

TCP/IP layers

A

Network interface / data link layer
Internet layer
Transport layer
Application layer

68
Q

Describe the network interface/data link layer of TCP/IP

A

Enables the network software to transmit data on the physical network via the network adapter cards and network media.

Major protocol is Ethernet and wireless specs

69
Q

Describe the Internet layer of TCP/IP

A

Provides addressing, naming and routing
Major protocols: IP manages numeric host addresses across the Internet.
DHCP dynamic host configuration protocol manages automatic address assignment
ICMP Internet control message protocol
Test for communication between devices and sends error messages when network function is unavailable

70
Q

Describe the transport layer of TCP/IP

A

Provides connection and communication services.
Major protocols:
TCP Transmission Control Protocol
A connection oriented guaranteed delivery protocol. Waits for ACK (acknowledgement) and fixes errors when possible
UDP user datagram protocol
Ensures the consistent transmission of data packets or datagrams by bypassing error checking

71
Q

Describe the application layer of TCP/IP

A

Provides utilities that enable client applications on an individual system to access the networking software.
Major protocols:
NetBIOS. Network basic input output system. A simple broadcast based naming service
Sockets. A piece of software within an operating system that connects an application with a network protocol so that the application can request network services from the os
FTP. File transfer protocol. Enables the transfer of files between a users workstation and a remote host over a TCP network.

72
Q

A port scanning attack is

A

Network attack where a potential attacker scans the devices connected to the Internet to see which TCP and UDP ports are listening and which services on the system are active.

73
Q

An eavesdropping attack is

A

Also called sniffing attack uses special monitoring software to gain access to private network communications. Can be done on wired and wireless networks. Hard to detect

74
Q

Man In the middle attack is

A

A form of eavesdropping where the attacker makes an independent connection between two victims and relays info between the two as if they are directly talking over closed connection but in fact the attacker is controlling the info that travels between the two victims.

75
Q

A replay attack is

A

A network attack where an attacker captures network traffic and store it for retransmitting at a later time to gain unauthorized access to a specific host/network.

76
Q

Types of social network attacks

A
Evil twin attack and account phishing
Drive-by download 
Clickjacking
Password stealer 
Spamming
77
Q

Describe an evil twin attack

A

An attack in a social networking site where an attacker creates a social network account to impersonate a genuine user. Then users add the attacker account as a friend and has access to personal details etc.

78
Q

Describe drive-by download

A

A program thats automatically installed on a computer when a user accesses a malicious site

79
Q

Describe clickjacking

A

A social network attack that tricks a user into clicking an unintended link. Uses a combo of visible and invisible HTML frames to fool the user into thinking they are clicking what’s visible. The invisible link is layered on top of or beneath the visible from

80
Q

Describe password stealer attack

A

A social network attack where software is installed on a system and captures all the passwords and user names entered into the messaging app or social network site which is sent to the attacker

81
Q

Describe spamming attack

A

In social networking refers to sending unsolicited bulk messages in a social network site

82
Q

What is DoS attack

A

A denial of service attack a network attack where an attacker disrupts or disables systems that provide network services.
Includes flooding link to consume bandwidth
Exploit known flaws
Sending multiple service requests
Flooding email inbox

83
Q

What is a DDoS attack

A

A distributed denial of service attack a type of DoS attack that uses multiple computers in disparate networks to launch the attack simultaneously. Computers turned into zombies or drones to carry out attack

84
Q

Types of DoS attacks

A
ICMP flood
UDP Flood
SYN flood
Buffer overflow
Reflected DoS attack
Permanent DoS attack
85
Q

Describe ICMP flood attack

A

DoS attack based on sending high volumes of ICMP pings packets to a target. Aka smurf attacks and ping floods.

86
Q

Describe UDP flood attack

A

DoS attack that overwhelms the target with UDP ping requests

87
Q

Describe SYN flood attack

A

DoS attack sends countless requests for a TCP connection (SYN messages) to an FTP server, web server attached to the Internet. Target server will stop responding to legitimate request because memory resources are flooded with incomplete TCP connections

88
Q

Buffer overflow attack

A

DoS attack where too much data is fed into a fixed length memory buffer resulting in adjacent areas of memory being overwritten. Or when an excessive amount of incomplete Fragmented traffic on a network.

89
Q

Describe reflected DoS attack

A

DoS or DDoS attack where a forged source IP address is used when sending requests to a large number of computer. Causes those systems to send a reply to the target system causing a DoS condition

90
Q

Describe permanent DoS attack

A

Also called phlashing. Targets the actual hardware of a system to prevent the victim from recovering from denial of service. Forces repair or replace the hardware.

91
Q

What is a session hijacking attack

A

Exploits a computer in session to obtain unauthorized access to an organizations network or services. Involves stealing an active session cookie used to authenticate a user to a remote server and use that to control the session

92
Q

What is a P2P attack

A

Peer to peer attack launched by malware propagating through P2P networks. These networks typically share command and control architecture making detection more difficult.

93
Q

What is ARP poisoning

A

Address Resolution Protocol individual hardware addresses are matched to an IP address on a network. Poisoning or ARP spoofing occurs when an attacker redirects an IP address to the MAC address of an unintended computer

94
Q

What is a transitive access attack

A

The access given to certain members in an organization to use data in a system without needing to authenticate themselves. The list of members with this access is usually in a host file. An attack accesses the list and takes advantage of access given to steal or destroy data in a system. Attacks from the client side of a network

95
Q

What are the two DNS vulnerabilities

A

DNS poisoning. Exploits the open nature of DNS system to redirect a domain name to an IP address of the attackers choosing

DNS hijacking. An attacker sets up a rogue DNA server to respond to legitimate requests with IP Addresses to malicious or non existent websites.

96
Q

What is wireless security

A

Any method of securing wireless LAN network to prevent unauthorized network access and network data theft. Wireless networks are more vulnerable to attacks. Wireless transmission can be scanned or sniffed out of the air so use relevant security protocols to avoid

97
Q

What is a rogue access point

A

An unauthorized wireless access point on a network. Not easily detected and can allow private network access to unauthorized users. Can allow man in the middle attacks. Protect from by installing IDS.

98
Q

Describe evil twins in wireless networking attack

A

Access points on a wireless network that fool users into believing they are legitimate by having similar names as trusted ones. Typically found in public Wi-Fi hotspots and connect from available networks on a lost. More dangerous than rogue access points

99
Q

What is jamming in terms of wireless wireless networking

A

Also called interference. An attack where radio waves disrupts 802.11 wireless signals. Causes the 802.11 signals to wait before transmitting and the wait can be indefinite. Attackers my use radio Transceiver to intercept transmission and inject jamming packets

100
Q

What is bluejacking

A

Attack sends out unwanted Bluetooth signals from Bluetooth enabled devices. Close range attack that sends out unsolicited messages along with images and video. Can lead to device malfunctions through viruses and Trojan horses.

101
Q

What is bluesnarfing

A

Attacker gain access to unauthorized information on a wireless device using Bluetooth transmission. Exploits private information, email messages, images and video

102
Q

What is a near field communication (NFC) attack

A

NFC is a standard of communication between mobile devices in close proximity. An attacker could eavesdrop on the RF signals emitted and corrupt data as it is being transferred by flooding the area with excess of RF signals

103
Q

What is war driving

A

Locate wireless access points while traveling to obtain unauthorized Internet access and steal data. Can be automated using GPS and software

104
Q

What is ear chalking

A

Using symbols to mark off sidewalks or walks to indicate open wireless network offering Internet access.

105
Q

What is an IV attack

A

An initialization vector is a number added to a key that constantly changes in order to prevent identical text from producing the same ciphertext upon encryption. An attack allows the attacker to predict or control the initialization vector to bypass

106
Q

What is packet sniffing

A

Used as an attack on wireless networks where an attacker captures data and registers data flow to be analyzed to launch a more effective attack on a network. In the benign form helps an organization monitor their own network against attackers

107
Q

Describe wireless replay attacks

A

Weak or no encryption on a wireless network allows attacker to capture packers and replay them to manipulate data stream

108
Q

Describe sinkhole attacks

A

Takes advantage of routing on a wireless network by creating a single node through which traffic is funneled. Tricks other nodes into redirecting their traffic. Attackers can intercept data packets and slow a network.

109
Q

List some environmental threats and vulnerabilities

A
Fire
Hurricanes and tornadoes
Flood
Extreme temperature 
Extreme humidity
110
Q

Describe WEP attack

A

Wired Equivalent Privacy algorithm was the earliest way to secure wireless networks. Used a stream bit cipher to encrypt data and relied on IV to randomize identical strings of text. Extremely vulnerable to IV attack. Should not be used

111
Q

Describe WPA/WPA2 attacks

A

Superseded WEP. Wi-Fi Protected Access protocol. Generates 128 bit key for each packet. Uses RC4 stream cipher. WPA2 uses AES block cipher for encryption. If secured with Weak passwords are susceptible to brute force password cracking attacks. Allows attacker to inject malicious packets into the wireless data stream.

112
Q

What is a WPS attack

A

The Wi-Fi Protected setup feature is a flaw in WPA & WPA2. Was intended to strengthen wireless security encryption but can be cracked easily

113
Q

Physical security refers to

A

The implementation and practice of control mechanisms intended to restrict physical access to facilities. Challenged by facility intrusions, electrical grid failures, fire, personnel illness and data network interruptions.

114
Q

List four physical security threats

A

Internal
External
Natural
Man made

115
Q

What is a hardware attack

A

An attack that targets a computers physical components and peripherals.destruction of hardware. Theft of data. Disrupts and causes loss

116
Q

What is Keylogging attacks

A

Hardware attack that captures sensitive data with a variety of software or hardware like keyghost or key grabber