Threat vectors and attack surfaces Flashcards
SY0-701
Threat vector
Means or path that an attacker can use to access networks or computers to deliver a malicious payload or carry out an unwanted action, ie how
Attack surface
Encompasses all various points where an unauthorized user can try to enter data to extract data, ie where
How to minimize
Restricting access, removing unnecessary software, disabling unused protocols
Messages
message based threat vectors delivered by email, sms, or other forms of IM, IE, phishing campaign
Images
Imaged based threat vector involve embedding of malicious code inside an image file by the threat actor
Files
File based threat vector use malicious files to deliver cyber threats, ie, disguised as legit, can be transferred via email. Or downloaded game from file share
voice calls
Voice call threat vectors involve the use of voice calls to trick victims into revealing their sensitive info. May try to impersonate a bank or IRS
Removable devices
threat vectors delivered via USB or other removable devices. Baiting can be used by hackers leaving usb devices for victims who are unknowing, or social engineering
Unsecure networks
threat vectors that lack appropriate security measures for protection, like wifi, bluetooth
Blueborne
exploit in bluetooth that can allow an attacker to take over devices or spread malware
Bluesmack
Type of denial service attack that targets bt enabled devices by sending specifically crafted Logical Link Control and adaptation protocol packet which can cause device to crash or become inoperable