Threat Vectors and Attack Surfaces Flashcards

1
Q

What is a threat vector?

A

Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

Threat vectors detail the methods of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the attack surface encompass?

A

All the various points where an unauthorized user can try to enter data to or extract data from an environment

Minimizing the attack surface is crucial for enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can the attack surface be minimized?

A
  • Restricting Access
  • Removing unnecessary software
  • Disabling unused protocols

These actions help reduce potential entry points for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the relationship between threat vector and attack surface?

A

Threat vector is the ‘how’ of an attack, whereas the attack surface is the ‘where’ of the attack

Understanding both concepts is essential for effective cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are message-based threat vectors?

A

Threats delivered via email, SMS text messaging, or other forms of instant messaging

Phishing campaigns are a common example of this type of threat vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

A campaign where an attacker impersonates a trusted entity to trick victims into revealing sensitive information

This is often executed through email or messaging platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do image-based threat vectors involve?

A

Embedding of malicious code inside of an image file by the threat actor

Attackers can disguise malware in seemingly harmless images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can files be used as threat vectors?

A

Files, often disguised as legitimate documents or software, can be transferred as email attachments, through file-sharing services, or hosted on a malicious website

Users should be cautious of unexpected file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is vishing?

A

Use of voice calls to trick victims into revealing their sensitive information to an attacker

This is a form of social engineering attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is baiting in the context of removable devices?

A

An attacker leaves a malware-infected USB drive in a location where their target might find it

This technique manipulates the victim’s curiosity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are unsecure networks?

A

Wireless, wired, and Bluetooth networks that lack appropriate security measures to protect them

Unsecure networks are vulnerable to interception and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are wired networks still vulnerable to threats?

A

Physical access to the network infrastructure can lead to various attacks

Security should be maintained regardless of the network type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MAC address cloning?

A

A technique where an attacker alters the MAC address of their device to impersonate another device

This can facilitate unauthorized access to networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is VLAN hopping?

A

Exploiting vulnerabilities in network switches to gain access to traffic on different VLANs

This can lead to unauthorized data interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is BlueBorne?

A

A set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or intercept communications without user interaction

This highlights the risks associated with Bluetooth connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is BlueSmack?

A

A type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet

This can disrupt connectivity and functionality of Bluetooth devices.