Security Threat Landscape Flashcards
Has the potential to cause harm to an IT Asset…
Threat
A weakness that compromises the security or functionality of a system…
Vulnerability
Uses a weakness to compromise the security or functionality of a system…
Exploit
The likelihood of a successful attack…
Risk
Techniques to eliminate or reduce the potential of and seriousness of an attack…
Mitigation
Malicious software including viruses, trojan horses, worms and ransomware…
Malware
Obtains information about the intended victim in an unassuming, unobtrusive way such a searching WHOIS, phone directories, etc…
Reconnaissance
The use of user deception to manipulate individuals into divulging confidential or personal information…
Social Engineering
A Social Engineering attack where the attacker pretends to be from a reputable company to get individuals to reveal person information, such as passwords and credit card numbers….
Phishing
An attack where data leaves an organization without authorization…
Data Exfiltration
This type of attack prevents legitimate users from accessing an IT resource typically in brute force fashion…
DoS (Denial of Service)
A specific type of DoS attack when an attacker only sends Syn and receives SynAcks but never sends back an Ack…
TCP Syn Flood Attack
A DoS but from multiple sources…
DDoS (Distributed Denial of Service)
This is an army of infected zombie hosts…
Botnet
This attack is where an attacker fakes their identity …
Spoofing
A type of DoS attack where the attacker spoofs the victim’s source address…
Reflection and Amplification Attack
With this attack, the attacker inserts themselves into the communication path between legitimate hosts…
Man in the Middle
An attack where the attacker has connectivity to a login window, they can attempt to gain access to the system behind it…
Password Attack
An Attacker sends malformed and/or too much data to the target system…
Buffer Overflow Attack
An attack where an attacker has compromised a target system or inserted themselves into the network path, Packet Sniffers such a WireShark can be used to read the sent and received packets…
Packet Sniffer
IDS and IPS’ use what to inspect packets?
Signatures
What layer can IDS and IPS’ inspect packets up to?
Layer 7
In regards to the traffic flow, IDS does what?
Sits alongside the traffic flow
In regards to the traffic flow, an IPS does what?
Sits inline with the traffic flow