Network Security Threats And Attacks 13 Flashcards
Physical security threats and vulnerabilities can come from many different areas
Internal. Like a disgruntled employee
External
Natural
Man-made. Can be internal or external
Physical security refers to
The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities
Environmental threats and vulnerabilities
Fire. Can destroy hardware and the data contained in it
Hurricanes and tornados. Magnitude of the damage
Flood
Extreme temperature
Extreme humidity
What is a social engineering attack
Uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines
Types of social engineering attacks
Spoofing. Pretend to be someone else to conceal identity. Occurs using IP addresses, MAC addresses, and email
Impersonation. Attacker pretends to be someone he is not.
Phishing. Email based attack. Gain account info
Vishing. Use voip to gain confidential info
Whaling. Form of phishing targeting the wealthy
Spam and spim. Email based. Flooded with emails. Spim im based attack
Hoax. Incorrect info sent to multiple users
What is a malicious code attack
Type of software attack where an attacker inserts undesired software or malware into a target system
Uses include DoS attacks on other systems, hosting illicit or illegal data, skimming personal or business information for identity theft, profit, or extortion.
Types of malicious code attacks
Virus. Code that spreads by attaching itself to other files.
Worm. Code that spreads on its own. Doesn’t stitch to another file.
Trojan horse. Is itself a software attack. User fooled into executing it.
Logic bomb. Piece of code that sits dormant on a target computer until triggered by a specific event
Spyware. Malicious software intended to track and report the usage of a system
Adware. Software that automatically displays or downloads ads when it is used.
Rootkit. Code intended to take control of a system at the lowest levels.
Botnet. Set of computers that have been infected by a control program called a bot that enables attackers to exploit them and mount attacks.
What is software attack
Any attack against software resources including os, applications, protocols, and files.
Name the types of viruses
Boot sector. Infects any disk based media, writes itself in the boot sector
Macro. A group of application specific instructions that execute within a specific application
Mailer and mass mailer. Sends itself to other users through the email system
Polymorphic. Can change as it moves around acting differently in different systems
Script. Runs code using the windows scripting host
Stealth. Moves and attempts to conceal itself until it can propagate then drops its payload
What is buffer overflow
An attack that targets system vulnerabilities to cause the device os to crash or reboot, and may result in loss of data or execute rogue code on devices.
What is a password attack
Any type of attack where the attacker attempts to obtain and make use of passwords illegitimately. Can show up in audit logs as repeatedly failed logons and then a successful on.
Types of password attacks
Guessing. Repeated attempts by entering different common password values.
Stealing. Sniffing network communications, reading handwritten password notes, observing user as they enter password
Dictionary attack. Automates password guessing
Brute force attack. Use of password cracking software to attempt every possible alphanumeric password combination
Hybrid password attack. Utilizes multiple attack vectors to crack a password.
What is an IP spoofing attack
Software attack where an attacker creates IP packets with a forged source IP address and uses those packets to gain access to a remote system.
Takes advantage of applications and services that authenticate based on IP address, devices that run Sun RPC or Windows, the GUI system in Unix systems. Services that have been secured using TCP wrappers. Legacy technologies. Routers not configured to drop incoming external packets with internal IO addresses
What is session hijacking attacks
Exploiting a session to obtain unauthorized access to an organizations network or services.
Involves stealing an active session that is used to authenticate a user and to a server and controlling the session.
What is a DoS attack
A denial of service attack is a type of network attack in which an attacker attempts to disrupt or disable systems that provide network services.
Accomplished by flooding a network link with data to so sure all available bandwidth
Sending data designed to exploit known flaws in an application
Sending multiple service requests to consume a systems resources
Flooding a users email inbox with spam messages
Or by disconnecting a network cable
What is a smurf attack
A type of DoS attack that exploits vulnerabilities in ICMP by overloading a host with ping requests and clogging a network with traffic.
Creates a false ICMP Echo request packet that’s uses the address of the targeted host as the source and a network broadcast address as the destination.
What is a DDoS attack
A distributed denial of service
A type of DoS attack that uses multiple computers on disparate networks to launch the attack from many Simultaneous sources.
Attacker introduces unauthorized software called a zombie or drone that directs the computer to laugh the attack
What is a man in the middle attack
A form of eavesdropping where the attacker makes an independent connection between two victims and relays information between the two Victims as if they are directly talking to each other. In reality the attacker is controlling the information that travels between the two victims
What are eavesdropping attacks
Also called sniffing attack, uses a special monitoring software to intercept private network communications, either to steal the content of the communication itself or to obtain user names and passwords for future network attacks.
What is a port scanning attack
A network attack where an attacker scans the computers and devices that are connected to the Internet to see which TCP and UDP ports are listening and which services on the system are active.