Section 2.2 Flashcards

1
Q

What is a threat vector?

A

A Threat vector is a method used by an attacker to gain access or infect a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Message-based Threat Vectors?

A

Attackers send malicious links via Email or SMS. Clicking this link can lead to download of malicious applications or it can be a link to a malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Image-Base Threat Vectors?

A

Image formats can be a threat, such as the SVG format, which not only contains the image, but also data in XML format that describes the image. Attackers could use this image base format to inject HTML code or javascript attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are File-Based Threat Vectors?

A

Malicious code can be hidden in files such as Adobe PDF, or in compression files such as ZIP/RAR or even in Microsoft Office Macro files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Voice Call Threat Vectors?

A

Vishing is phishing over the phone in which attackers may call you in order to get sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Removable Device Threat Vectors?

A

This threat vector includes the ability to run malicious code through a usb that’s connected to a system (may be air gapped but it doesnt matter if a usb is conencted to it). An attacker might go to the parking lot and throw a usb with malicious code in hopes of someone picking it up, bringing the usb inside and then inserting it in one of the organizations computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Vulnerable Software Threat Vectors?

A

This threat vector is specific to running software that has known vulnerabilities that are not patched. The attacker knows about these vulnerabilities and may attack the system using these vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Unsupported Systems Threat Vectors?

A

Running unsupported systems means that the manufacturer is no longer patching known vulnerabilities. This means that the attacker may attack the vulnerabilities since they know that these vulnerabilities are no longer being fixed by the manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Unsecure Network Threat Vectors?

A

This threat vector is specific to attackers taking advantage of networks that are not secure. This is why it’s important to use the latest security protocols for wireless and wired connections as well as bluetooth connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a way for there to be open service ports?

A

Most network based services connect over TCP or UDP ports, which means that every service we may use, may open ports that may provide an opportunity to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Supply Chain Threat Vectors?

A

This threat vector is specific to attackers taking advantage of vulnerabilities of vendors that are being used in your infrastructure. If a vendor has a vulnerability and their device is within your infrastructure, then your infrastructure may be at risk as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phishing?

A

Phishing is a term we use to describe social engineering that uses a number of different communication methods to make you think that something is real, when in fact it really isn’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are different ways Phishing is delivered?

A

Phishing is usually delivered through email, text, phone calls, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are spoofed email addresses?

A

Email addresses that are very close to a legitimate email address but usually are a character or two off. These are used to make the target think that the email is coming from a real source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is typosquatting?

A

Typosquatting is a type of misdirection used by attackers, for example creating a URL that’s almost the same as the legitimate URL but has a character misspelled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is pretexting?

A

Pretexting is the story that the attacker will create to lure you into doing something such as clicking on a malicious link, etc.

17
Q

What is Vishing?

A

Vishing is phone phishing. An attacker will call you over the phone to try and get sensitive details such as bank account, ssn, etc.

18
Q

What is Smishing?

A

Smishing is phishing through text messages. For example sending a pretext story and a link for you to click in the text message you receive.

19
Q

What is meant by Watering Hole Attack?

A

The attacker, instead of trying to directly attack your company, they will attack a website that your company uses, and then wait for your employees to visit the website and provide sensitive information.

20
Q

What is meant by Defense-in-depth?

A

Defense in depth means that you have deployed a layered defense such as anti-virus, firewall, intrusion prevention system and more.