Physical Attacks Flashcards

1
Q

Physical Attacks

A

Direct attacks on computational devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name some Environmental Factors

A

Electricity, Temperature, and Limited Conductance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electricity (as an environmental factor)

A

Computing equipment requires stead uninterrupted power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Temperature (as an Environmental Factor)

A

Computer chips have a natural operating temperature and exceeding that temperature significantly can have sever consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Limited Conductance (as an Environmental Factor)

A

Computing equipment relies on there being limited conductance in its environment. If random parts of a computer are connected electronically, then that equipment could be damaged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eavesdropping

A

The process of secretly listening in on another person’s conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protection of sensitive information must go beyond computer security and extend to the ______________ in which this information is entered and read.

A

Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 simple eavesdropping techniques?

A
  1. Using social engineering to allow the attacker to read information over the victim’s shoulder (over shoulder)
  2. Installing small cameras to capture the information as it is being read (via camera)
  3. Using binoculars to view a victim’s monitor through an open window (look through open window)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the commingle referred to name of the direct observation techniques that were named?

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wiretapping

A

A form of eavesdropping involving physical connection to the communications channels to breach the confidentiality of communications;

to tap a telephone or telegraph wire or cellular signal in order to get information.

Inexpensive coaxial copper cables where information is transmitted via electrical impulses that travel through the cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Danger/Risk of Wiretapping

A

Because it’s relatively inexpensive, impulse can be measured and can reconstruct the data being transferred through a tapped cable - allowing an attacker to eavesdrop on network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True/False: Wiretapping Attacks are passive?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are wiretapping attacks considered passive attacks?

A

Because there is no alteration of the signal being transferred which makes them extremely difficult to detect; it’s snooping;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passive Attack

A

When attacker cannot interact with any of the parties involved, attempting to break the system socket based upon observed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two type is Signal Emanations

A
  1. Radio Frequencies

2. Visible Light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer screens emit _______________________ that can be used to ________ what is ____________________.

A

Radio frequencies
Detect
being displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of reflections can be used to reconstruct a display from its reflection on a wall, coffee mug, or eyeglasses.

A

Visible Light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Both ____________________ and _____________________ require the attacker to have a receiver close enough to detect the signal.

A

Radio signal and Visible light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Acoustic Emissions

A

An attacker using an audio recording of a user tying on a keyboard to reconstruct what was typed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Differential Power Analysis (DPA attack)

A

A side channel attack on smart cards with secure crypto precede or. Each crypto operation requires different power consumption.

a powerful tool attackers used to extract secret keys and compromise the security of tamper resistant devices

(extremely effective, low cost, and widely known)

21
Q

Side Channel Attack

A

any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself. i.e. DPA

22
Q

Hardware Keyloggers

A

Small connectors that are installed between a keyboard and a computer

23
Q

Keylogger

A

Any means of recording a victim’s keystrokes, typically used to eavesdrop passwords or other sensitive information

24
Q

USB Keylogger

A

A device containing male and female USB connectors, which allow it to be placed between a USB port on a computer and a USB cable coming from a keyboard.

25
Q

Emanation Blockage

A

Limiting the release of information from escaping into its general environment

26
Q

Different type of Emanation Blockage

A

+Visible Light Emanations
+Acoustic Emanations
+Electromagnetic Emanations

27
Q

How to block Visible light emanations?

A

By enclosing sensitive equipment in a windowless room, we block it.

28
Q

How to block Acoustic Emanations?

A

By enclosing sensitive equipment in a room lined with sound-dampening materials, we block this.

29
Q

How to block electromagnetic emanations?

A

By making sure every electrical cord and cable is well grounded and insulated, we block this.

30
Q

Faraday Cages

A

An enclosure used to block electro magnetic fields/emanations in the air.

Surround sensitive equipment with metallic conductive shielding or mesh material where holes in the mesh are smaller than the wavelengths of the electromagnetic radiation we wish to block.

31
Q

Computer Forensics

A

The practice of obtaining information contained on an electronic medium, such as computer systems, hard drives, and optical disks, usually for gathering evidence to be used in legal proceedings.

32
Q

(True/False)

Many of the advanced techniques used by forensic investigators for legal proceedings can also be employed by attackers to uncover sensitive information.

A

True

33
Q

What all does a Forensic Analysis involve?

A

It involves the physical inspection of the components of a computer, sometimes at the microscopic level, but it can also involve electronic inspection of a computer’s parts as well.

34
Q

When a ___1___ is deleted, many ___2__ remove the ______3*_____.

A
  1. file
  2. OS
  3. file’s metadata
35
Q

Metadata

A

Information about file size, location, and other properties; data about data;

36
Q

Space within the __1__ containing __2____ is __3__ allowing future ___4*_______ to ____5____ it.

A
  1. disk
  2. metadata
  3. freed
  4. file operation
  5. overwrite
37
Q

T/F?

Can forensic tools uncover “deleted” data if no overwriting has occurred?

A

True

38
Q

Cold Boot Attack

A

A type of side channel attack where begins a process for obtaining unauthorized access to a computer’s encryption keys when the computer is left physically unattended.

+ memory dump of RAM
+ used for retrieving encryption keys from a running OS for malicious reasons
+ relies on DRAM & SRAM

39
Q

DRAM

A

Dynamic Random-Access Memory aka Dynamic RAM : type of RAM or computer memory and the most commonly used as main memory; used for the data or program code needed b a computer processor to function.

40
Q

T/F? DRAM is voalitle?

A

True

41
Q

What does cooling the DRAM in low temperature cause?

A

A significant slow in decay. This makes the content of the memory able to be reconstructed.

42
Q

How have researchers demonstrated how to reconstruct memory image?

A

By having powering off preceded by freezing the RAM and then booting from a live CD

43
Q

ATM

A

Automatic Teller Machine that allows customers of financial institutions to complete withdrawal and deposit transactions without human assistance.

44
Q

The ATM has an _______1*__________ processor that creates a __2__ of a card number using the entered __3__ and __4__ it to the ___5__ hash on the card or in a ___6__ database.

A
  1. internal cryptographic
  2. hash
  3. PIN
  4. compares
  5. stored
  6. remote
45
Q

3 Types of Attacks on ATMs?

A

Fake ATM, Lebanese Loop, and Skimmer

46
Q

Fake ATM

A

captures both credit/debit cards and PINs at the same time.

47
Q

Lebanese Loop

A

Sleeve inserted into the card slot of the ATM, unknowingly. Customer inserts card, thinks machine malfunctions and leaves. The sleeve is then removed with the victim’s card.

48
Q

Skimmer

A

A device that reads and stores magnetic stripe information when a card is swiped. Skimmer is installed, unknowingly, over card slot of ATM & store’s credit card info. Info can be retrieved later and used to make duplicates of original cards.