Network Threats - Attacks Flashcards

1
Q

What are the network attacks I have to know about?

A
  • Brute Force Attack
  • DDOS
  • Packet Sniffing
  • Buffer Overflow
  • SQL Injection
  • Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a brute force attack?

A

A simple method of gaining someone’s password. An algorithm which creates various combinations of words and numbers until it gets the password or access key correct. This can also be used on hashed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we stop a brute force attack?

A
  • limiting number of login attempts or giving a wait period if amount of max attempts is exceeded
  • 2 factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DDOS?

A

A malicious attack attempting to overwhelm a target or its infrastructure with a flood of internet traffic. This is done by utilising multiple computers systems as a source of data traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can we stop a DDOS?

A

Servers can use a black hole routing method to drop all network traffic
Servers can alternatively limit the amount of requests over a certain amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packet sniffing?

A

A tool to intercept data flowing through a network as packets. A non-filtered network will broadcast data to all nodes. All traffic can be read by computer allowing user to seize everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can we stop packet sniffing?

A

use encryption on sent data

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a buffer overflow?

A

an attack allowing a remote user to execute arbitrary code into victims machine. The attacker can gain administrative access to machine and modify or get data. This often happens when an input goes over set limit and data overflows boundaries which leads to data overwrite with malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an SQL Injection Attack?

A

attack used to bypass security measures and access database content, which can be modified,deleted, downloaded etc. This attack is executed by entering a malicious input within a webpage or application, which is executed within the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can we stop an SQL injection attack?

A
  • use firewalls
  • strong client side validation
  • updating and patching regularly
  • hash database content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is phishing?

A

where a target is contacted by mail, SMS or phone by someone posing as a legitimate company or person to lure target into handing over sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly