Threats and Vulnerabilities Flashcards
CIA triad
Confidentiality / integrity / availability
Confidentiality
Encryption
WPA2 WEP
Integrity
Hashing
Hash MD5 SHA1 SHA256
Availability
Redundancy reliability
CVE
Common vulnerabilities and exposures
Known vulnerabilities
Zero day
Unknown vulnerabilities
5 vulnerability types
Non-compliant systems
Unpatched
Unprotected
EOL-OS
BYOD
3 DOS types
Flood attack - ping flood / SYN flood
Permanent DOS - forceful reflashing
Fork bomb - fills up a processor
DDOS type uses zombies or bots
DNS amplification - flood a website with DNS requests
3 Spoofing types (faking identity)
Ip spoofing - faking ip address (layer 3)
Mac spoofing - (layer 2)
ARP spoofing - arp request to pair ip+mac
4 on path attacks
(When a attacker puts themselves in the middle)
ARP poisoning
DNS poisoning
Rouge WAP
Rouge Switch
SSL stripping
Turns HTTPS into HTTP
Downgrade attack
Lowers the encryption version
SQL injection
Structured Query Language
Insert SQL info into input data on a web application
Example replace password with ‘or 1=1
XSS
Cross site scripting
Embeds script into website to effect the USER
XSRF
Cross Site Request Forgery
Forces authenticated user to effect the SERVER
4 Password Cracker types
Password guessing
Dictionary attack
Brute force attack
Cryptanalysis attack (compared hashes to a lookup table called a rainbow table)
- Symptoms of infection with malware
Hard drive, files, or apps aren’t accessible
Strange noises
Unusual error messages
Display looks strange
Jumbled printouts
Double file extensions
New files or missing files
System restore won’t function
Sign of infection and how to counter
Computer is acting funny or strange
Boot into safe mode
Or boot from external and scan with antivirus
Phishing
Social engineering attack from supposedly reputable source trying to get victim to divulge information
Spear phishing
Targeted small group phishing
Whaling
Phishing fixed on executives
Smishing
Sms phishing (texting)
Vishing
Voice phishing