Network intrusion attacks Flashcards
How are Network interception attacks conducted?
by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.
The use of hardware or software tools to capture and inspect data in transit by malicious actors is called?
packet sniffing
How can Network inception attacks cause damage to an organisation’s network?
By inserting malicious code modifications or altering the message and interrupting network operations.
An attacker intercepts a bank transfer and changes the account receiving the funds to one that they control, is an example of what kind of attack?
Network interception attack
On-path attacks and replay attacks are types of?
Network Intrusion attacks
What are backdoors?
Weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms
How do backdoors help programmers
Backdoors are intended to help programmers conduct troubleshooting or administrative tasks
What does DoS stand for?
Denial of Service attack
What is a DoS attack?
An attack that targets a network or server and floods it with network traffic.
Name 3 potential consequences of Network attacks:
Financial
Reputation
Public Safety
Types of financial consequences of Network attacks:
Loss of revenue due to interrupted operations
Reparation costs: rebuilding software infrastructure and paying large sums associated with potential ransomware.
Heavy litigation and settlement costs if clients/customers seek legal recourse after their personal information has been illegally accessed.
Reputation consequences of Network attacks:
Negative impact on the reputation of an organization.
Public concern over the security practices of the organization that has experienced a cyber attack could cause distrust in that company handling their personal information and choosing a competitor.
What are the Public safety consequences following a government network attack?
Potential impact on the safety and welfare of the citizens of a country.
If a malicious actor gains access to a power grid, a public water system, or even a military defence comms system, the public could face physical harm.
What are the different types of network interception attacks?
Packet sniffing
On-path attacks
Replay attacks
How can attackers use packet sniffing to steal information?
By capturing and inspecting data in transit
By intercepting and altering network traffic
What are the potential impacts of a backdoor attack?
Installing malware
Performing a denial-of-service (DoS) attack
Stealing private information
Changing security settings
How can organizations protect themselves from network interception and backdoor attacks?
a) Implement strong security measures, such as firewalls and intrusion detection systems
b)Use encryption to protect sensitive data
c) Regularly update software and firmware
d) Train employees on cybersecurity best practices
What are some real-world examples of network interception and backdoor attacks?
1) The 2014 Target data breach, in which attackers used packet sniffing to steal the personal information of millions of customers
2) The 2017 WannaCry ransomware attack, which exploited a backdoor in Microsoft Windows to infect hundreds of thousands of computers