Session 4 : Network specific threats and attacks Flashcards

1
Q

DOS?

A
  • Aimed at making a machine or network resource unavailable to its intended users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of DOS?

A
  • Volume-based attacks
  • Protocol attacks
  • Application layer attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 vraients of DOS?

A
  1. DDoS
    * Many computers send overwhelming fake to a website to make in slow or unavailable.
  2. Unintentional DoS
    * Real visitors accidentally overload a website, causing it to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS mitigation strategies?

A
  1. Employ traffic filtering techniques that identify and block malicious traffic while allowing legitimate users access.
  2. Outsourcing traffic management to third-party service that specialize in DDoS protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spoofing?

A

Someone pretend to be a legitimate person to trick people or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Spoofing?

A
  • Email Spoofing
  • IP Spoofing
  • DNS Spoofing
  • Website Spoofing
  • ARP Spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network sniffing?

A

Capturing sensitive information travel over a network and manipulate data flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic Redirection?

A

Capture and change the normal path of network data, to an attacker’s device.

Common methods
* ARP spoofing
* DNS hijacking

Enables MitM attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sniffing and TR detection challenges?

A
  • Stealthy nature
  • Encrypted traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MitM?

A

An attacker secretly intercepts and possibly alters the communication between two parties,
making each believe they are directly communicating to each other.

How it works:

  • ARP Spoofing
  • DNS Hijacking
  • SSL Stripping

Let attacker capture sensitive data or modify communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevent MitM?

A
  • Encryption : use strong protocols to secure data. (HTTPS, VPN, SSH)
  • Authentiation : employ mutual authentication to verify botj ends of a connection.
  • Network security : use secure network configurations and monitoring tools to detect unusual routing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Message Integrity Attacks?

A

capture the messages trasmitted over networks, and altering them for malicious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Message integrity attacks types?

A
  1. Modification Attacks : altering existing messages in transit, mislead recipients into acting false information.
  2. Replay Attacks : capture a message and retransmit it later to trick the recipient or gain unauthorized access.
  3. Falsification : completly replace a legitimate message with fraudulent one.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routing attaks?

A

Target the mechanism that manage how data packets are directed across network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Routing attacks types

A
  • DOS
  • Routing table poisoning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Traffic analysis?

A

Intercepting and observing network traffic to get valuable insights.

  • Exploiting network metadata
  • DOS