Threats and Vulnerabilities Flashcards
CIA triad
Confidentiality / integrity / availability
Confidentiality
Encryption
WPA2 WEP
Integrity
Hashing
Hash MD5 SHA1 SHA256
Availability
Redundancy reliability
CVE
Common vulnerabilities and exposures
Known vulnerabilities
Zero day
Unknown vulnerabilities
5 vulnerability types
Non-compliant systems
Unpatched
Unprotected
EOL-OS
BYOD
3 DOS types
Flood attack - ping flood / SYN flood
Permanent DOS - forceful reflashing
Fork bomb - fills up a processor
DDOS type uses zombies or bots
DNS amplification - flood a website with DNS requests
3 Spoofing types (faking identity)
Ip spoofing - faking ip address (layer 3)
Mac spoofing - (layer 2)
ARP spoofing - arp request to pair ip+mac
4 on path attacks
(When a attacker puts themselves in the middle)
ARP poisoning
DNS poisoning
Rouge WAP
Rouge Switch
SSL stripping
Turns HTTPS into HTTP
Downgrade attack
Lowers the encryption version
SQL injection
Structured Query Language
Insert SQL info into input data on a web application
Example replace password with ‘or 1=1
XSS
Cross site scripting
Embeds script into website to effect the USER