Section 2.4 attacks Flashcards

1
Q

DOS Attack

A

Definition: A Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, typically by flooding it with excessive requests.

Example: Flooding a website with traffic to the point where it crashes and becomes inaccessible to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDOS Attack

A

Definition: A Distributed Denial of Service (DDoS) attack is similar to a DoS attack but is launched from multiple sources simultaneously, making it more difficult to mitigate.

Example: Coordinated attack from a botnet targeting a specific server, overwhelming its capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Attack

A

Definition: A Domain Name System (DNS) attack targets the DNS server infrastructure to disrupt or manipulate DNS resolution.

Example: DNS Spoofing, where attackers redirect users to malicious websites by falsifying DNS records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Attack

A

Definition: Attacks targeting wireless networks, exploiting vulnerabilities in protocols like Wi-Fi (802.11).

Example: Man-in-the-Middle (MitM) attacks, where an attacker intercepts communication between devices on a Wi-Fi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On-Path Attack

A

Definition: Attacks where the attacker is positioned on the communication path between two parties, allowing them to intercept or manipulate data.

Example: ARP Poisoning, where the attacker sends false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of the victim, redirecting traffic through them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Replay Attacks

A

Definition: Attacks where a valid data transmission is intercepted and maliciously retransmitted, often to gain unauthorized access or perform unauthorized actions.

Example: Capturing network traffic containing authentication credentials and replaying it to gain access to a system without proper authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly