Network intrusion attacks Flashcards

1
Q

How are Network interception attacks conducted?

A

by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The use of hardware or software tools to capture and inspect data in transit by malicious actors is called?

A

packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can Network inception attacks cause damage to an organisation’s network?

A

By inserting malicious code modifications or altering the message and interrupting network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker intercepts a bank transfer and changes the account receiving the funds to one that they control, is an example of what kind of attack?

A

Network interception attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On-path attacks and replay attacks are types of?

A

Network Intrusion attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are backdoors?

A

Weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do backdoors help programmers

A

Backdoors are intended to help programmers conduct troubleshooting or administrative tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DoS stand for?

A

Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DoS attack?

A

An attack that targets a network or server and floods it with network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 3 potential consequences of Network attacks:

A

Financial
Reputation
Public Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of financial consequences of Network attacks:

A

Loss of revenue due to interrupted operations

Reparation costs: rebuilding software infrastructure and paying large sums associated with potential ransomware.

Heavy litigation and settlement costs if clients/customers seek legal recourse after their personal information has been illegally accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reputation consequences of Network attacks:

A

Negative impact on the reputation of an organization.
Public concern over the security practices of the organization that has experienced a cyber attack could cause distrust in that company handling their personal information and choosing a competitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Public safety consequences following a government network attack?

A

Potential impact on the safety and welfare of the citizens of a country.
If a malicious actor gains access to a power grid, a public water system, or even a military defence comms system, the public could face physical harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of network interception attacks?

A

Packet sniffing
On-path attacks
Replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can attackers use packet sniffing to steal information?

A

By capturing and inspecting data in transit
By intercepting and altering network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the potential impacts of a backdoor attack?

A

Installing malware
Performing a denial-of-service (DoS) attack
Stealing private information
Changing security settings

17
Q

How can organizations protect themselves from network interception and backdoor attacks?

A

a) Implement strong security measures, such as firewalls and intrusion detection systems
b)Use encryption to protect sensitive data
c) Regularly update software and firmware
d) Train employees on cybersecurity best practices

18
Q

What are some real-world examples of network interception and backdoor attacks?

A

1) The 2014 Target data breach, in which attackers used packet sniffing to steal the personal information of millions of customers

2) The 2017 WannaCry ransomware attack, which exploited a backdoor in Microsoft Windows to infect hundreds of thousands of computers