Unit 1 - Danger Flashcards
Another term for rogue wireless hotspots is “_____ ____” hotspots.
Another term for rogue wireless hotspots is “evil twin” hotspots.
What is an evil twin attack?
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam.
- Best way to avoid is to never use public wi-fi hotspots.
- Use VPN’s
- Only access HTTPS websites
- Use two factor login
What is a ransomware attack?
A ransomware attack is a form of malware attack in which an attacker seizes the user’s data, folders, or entire device until a ‘ransom’ fee is paid. Ransomware attack exploits the open security vulnerabilities by infecting a PC or a network with a phishing attack, or malicious websites.
Explain Targeted nations.
Malware that is so sophisticated and expensive to create that security experts believe only a nation state or group of nations could possibly have the influence and funding to create it. Such malware can be targeted to attack a nation’s vulnerable infrastructure, such as the water system or power grid.
List five types of threat actors.
Threat actors include, but are not limited to, amateurs, hacktivists, organized crime groups, state-sponsored, and terrorist groups. Threat actors are individuals or groups of individuals who perform cyberattacks. Cyberattacks are intentional malicious acts meant to negatively impact another individual or organization.
Describe amateur threat actors.
Amateurs, also known as script kiddies, have little or no skill. They often use existing tools or instructions found on the internet to launch attacks. Some are just curious, while others try to demonstrate their skills by causing harm. Even though they are using basic tools, the results can still be devastating.
Describe hacktavist threat actors.
Hacktivists are hackers who protest against a variety of political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles and videos, leaking sensitive information, and disrupting web services with illegitimate traffic in distributed denial of service (DDoS) attacks.
Things to consider when asking how secure a device is?
- Who wrote the firmware?
- Did the programmer pay attention to security flaws?
- Is your connected home thermostat vulnerable to attacks?
- What about your digital video recorder (DVR)?
- If security vulnerabilities are found, can firmware in the device be patched to eliminate the vulnerability?
- Many devices on the internet are not updated with the latest firmware. Some older devices were not even developed to be updated with patches. These two situations create opportunity for threat actors and security risks for the owners of these devices.
What is PII?
Personally identifiable information (PII) is any information that can be used to positively identify an individual. , email, phone numbers)
Examples of PII include?
Examples of PII include:
Name Social security number Birthdate Credit card numbers Bank account numbers Government issued ID Address information (street
What is PHI?
A subset of PII is protected health information (PHI). The medical community creates and maintains electronic medical records (EMRs) that contain PHI
In the U.S., handling of PHI is regulated by what organization.
In the U.S., handling of PHI is regulated by the Health Insurance Portability and Accountability Act (HIPAA).
What organization in the European Union works to protect a broad range of PII?
In the European Union the General Data Protection Regulation (GDPR) protects a broad range of personal information in including health records.
What is PSI?
Personal security information (PSI) is another type of PII. This information includes usernames, passwords, and other security-related information that individuals use to access information or services on the network. According to a 2019 report by Verizon, the second most common way that threat actors breached a network was by using stolen PSI.
An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?
A. cracking the admin password for a critical server
B. probing open ports on the firewall on the border network.
C. searching and obtaining trade secrets.
D. denying external access to a web server that is open to the public.
C. Searching and obtaining trade secrets
This is a malware attack. The purpose of a typical malware attack is to disrupt computer operations, gather sensitive information, or gain access to a private computer system. Cracking a password cannot be carried out by a simple malware attack because it requires intensive CPU and memory, which will make its operation noticeable. A reconnaissance attack would be used to probe open ports on a border firewall. Similarly, denying external access to a web server is a DoS attack launched from outside the company.