Threat Vectors and Attack Surfaces Flashcards
What is a threat vector?
Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action
Threat vectors detail the methods of attack.
What does the attack surface encompass?
All the various points where an unauthorized user can try to enter data to or extract data from an environment
Minimizing the attack surface is crucial for enhancing security.
How can the attack surface be minimized?
- Restricting Access
- Removing unnecessary software
- Disabling unused protocols
These actions help reduce potential entry points for attackers.
What is the relationship between threat vector and attack surface?
Threat vector is the ‘how’ of an attack, whereas the attack surface is the ‘where’ of the attack
Understanding both concepts is essential for effective cybersecurity.
What are message-based threat vectors?
Threats delivered via email, SMS text messaging, or other forms of instant messaging
Phishing campaigns are a common example of this type of threat vector.
What is phishing?
A campaign where an attacker impersonates a trusted entity to trick victims into revealing sensitive information
This is often executed through email or messaging platforms.
What do image-based threat vectors involve?
Embedding of malicious code inside of an image file by the threat actor
Attackers can disguise malware in seemingly harmless images.
How can files be used as threat vectors?
Files, often disguised as legitimate documents or software, can be transferred as email attachments, through file-sharing services, or hosted on a malicious website
Users should be cautious of unexpected file transfers.
What is vishing?
Use of voice calls to trick victims into revealing their sensitive information to an attacker
This is a form of social engineering attack.
What is baiting in the context of removable devices?
An attacker leaves a malware-infected USB drive in a location where their target might find it
This technique manipulates the victim’s curiosity.
What are unsecure networks?
Wireless, wired, and Bluetooth networks that lack appropriate security measures to protect them
Unsecure networks are vulnerable to interception and unauthorized access.
Why are wired networks still vulnerable to threats?
Physical access to the network infrastructure can lead to various attacks
Security should be maintained regardless of the network type.
What is MAC address cloning?
A technique where an attacker alters the MAC address of their device to impersonate another device
This can facilitate unauthorized access to networks.
What is VLAN hopping?
Exploiting vulnerabilities in network switches to gain access to traffic on different VLANs
This can lead to unauthorized data interception.
What is BlueBorne?
A set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or intercept communications without user interaction
This highlights the risks associated with Bluetooth connectivity.
What is BlueSmack?
A type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet
This can disrupt connectivity and functionality of Bluetooth devices.