PM - Section 1.2 Attack Types Flashcards
What is Phishing?
Social engineering + spoofing
Often delivered by spam, usually very well done.
What is Vishing?
Voice Phishing over the phone!
What is Spearing Phishing?
Focus in on specific people - CEO is whaling.
What is tailgating?
Use someone else gain access into a locked area to gain access.
Or wearing a camouflage.
Sneak in smoking break.
How to stop tailgating?
Must identify everyone - visitors have a badge.
Scanning in must be one person at a time - air locks.
Train staff to ask about visitors.
How to stop impersonation?
Never share PII.
Call numbers back and verify callers/emails.
What is dumpster diving?
Sifting through trash for information.
How do you protect against dumpster diving?
Shredding, locks, fence.
Check your own company’s trash and use for training.
What is shoulder surfing?
Curious, competitive advantage, industrial espionage.
People use webcams, binos etc
Use privacy filters.
What are computer hoaxes?
A way to waste time and consume resources.
A hoax about a virus can take as much time as a real virus.
How to prevent hoax attacks?
Check on:
hoax-slayer.net
snopes.com
Spam filters can help
What is a watering hole attack?
When your network/work environment is secure the attackers go to favorite coffee/sandwich shop and attack that place. Infect the wifi there and gain access through the coffee shop.
What is social engineering?
Tricking someone to get info, phone calls/emails. Authority - police/CEO calling... Intimidation - the payroll wont go out. Scarcity - this must happen now Familiarity - Trusting/friends
What is a denial of service? DoS
Force a service to fail - a design failure or vulnerability.
Could even just be an overload.
Could be simple e.g. cut power.
What is a friendly DoS?
Unintentional DoS - Layer 2 loop without Spanning Tree on Switches.
Not enough bandwidth.
Water main break
What is a DDoS?
Distributed Denial of Service - Botnets attack all at once for a coordinated attack.
DDoS attacks can be amplified
What is a man-in-the-middle attack?
Interrupting traffic and watching.
What is ARP poisoning?
AKA Spoofing!
Address Resolution Protocol has no security so you can update the ARP Cache.
Must be in the same local network.
Ettercap is a software to perform ARP poisoning.
What is man-in-the-brower?
A proxy is created on the system, and all info is sent through the proxy.
The malware must be installed on the machine first.
What is a buffer overflow?
Overwriting a buffer of memory. up to devs to stop it from happening.
Can open up access to the system and other variables.
What is code injection?
Inject any code into an application. Many types - html, sql, xml, LDAP.
Good Applications can validate the incoming data.
What is XSS?
Cross Site Scripting - Uses Javascript
Can have stored ones that live in a post on social networking site that gets activated when someone shared it.
What is Cross Site request forgery attack?
XSRF or CSRF or Sea Surf