Securing Individual Systems Flashcards
What attack prevents others from accessing a system and comes from a single source?
Denial of Service
Denial of service can be broadly broken down into what three categories?
Volumetric, Protocol, Application
Which type of DoS saturates the bandwidth of the attacked site to prevent other users from being able to access it?
Volumetric
Which type of DoS attack is comprised of seemingly legitimate and innocent requests but ultimately crashes the server?
Application attack
Which type of DoS attack consumes the server resources?
Protocol attack
What attack prevents others from accessing a system and comes from multiple sources?
Distributed denial-of-service attack
Which attack leverages the functionality of open DNS resolver in order to overwhelm a target server or network with an amplified amount of traffic, rendering the server and its surrounding infrastructure inaccessible.
Amplification attack
unsolicited emails
Spam
fraudulent attempt to obtain sensitive information usually through emails
Phishing
phishing attempts directed at specific individuals or companies (email contains the individual’s name or the company’s name.
Spear Phishing
receive Spam via instant messaging
Spim
unsolicited use of voice trying to get information from you (phone calls)
Vishing
technique of tricking a user into clicking on something different from what the user perceives
Clickjacking
form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser
Typosquatting
the act of changing the registration of a domain name without the permission of its original registrant, or by abuse of privileges on domain hosting and registrar software systems.
Domain Hijacking
the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user
Privilege Escalation
Third party intercepting between a two-party conversation
Man-in-the-middle attack
when a hacker impersonates another device or user on a network in order to steal data, spread malware, or bypass access controls.
Spoofing
Attack in which a third-party intercepts between a two-party conversation
Man-in-the-middle attack
form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
Replay attack
attack on a computer system or communications protocol that makes it abandon a high-quality mode of operation (e.g. an encrypted connection) in favor of an older, lower-quality mode of operation (e.g. cleartext) that is typically provided for backward compatibility with older systems
Downgrade attack
the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system
Session hijacking