Network intrusion attacks Flashcards
How are Network interception attacks conducted?
by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.
The use of hardware or software tools to capture and inspect data in transit by malicious actors is called?
packet sniffing
How can Network inception attacks cause damage to an organisation’s network?
By inserting malicious code modifications or altering the message and interrupting network operations.
An attacker intercepts a bank transfer and changes the account receiving the funds to one that they control, is an example of what kind of attack?
Network interception attack
On-path attacks and replay attacks are types of?
Network Intrusion attacks
What are backdoors?
Weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms
How do backdoors help programmers
Backdoors are intended to help programmers conduct troubleshooting or administrative tasks
What does DoS stand for?
Denial of Service attack
What is a DoS attack?
An attack that targets a network or server and floods it with network traffic.
Name 3 potential consequences of Network attacks:
Financial
Reputation
Public Safety
Types of financial consequences of Network attacks:
Loss of revenue due to interrupted operations
Reparation costs: rebuilding software infrastructure and paying large sums associated with potential ransomware.
Heavy litigation and settlement costs if clients/customers seek legal recourse after their personal information has been illegally accessed.
Reputation consequences of Network attacks:
Negative impact on the reputation of an organization.
Public concern over the security practices of the organization that has experienced a cyber attack could cause distrust in that company handling their personal information and choosing a competitor.
What are the Public safety consequences following a government network attack?
Potential impact on the safety and welfare of the citizens of a country.
If a malicious actor gains access to a power grid, a public water system, or even a military defence comms system, the public could face physical harm.
What are the different types of network interception attacks?
Packet sniffing
On-path attacks
Replay attacks
How can attackers use packet sniffing to steal information?
By capturing and inspecting data in transit
By intercepting and altering network traffic