Vulnerabilities of Data Transmission Flashcards

1
Q

What is a sniffing attack?

A

A sniffing attack refers to tapping network traffic or routing the traffic to a target where it can be captured, analysed, and monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are defences against sniffing attacks?

A

To defend against sniffing attacks we can:
Connect to trusted networks
Encrypt Data in traffic
Scan and monitor networks for intrusion and rogue devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a man in the middle attack?

A

With a traditional MITM attack, attackers will look to gain access to an unsecured or poorly secured Wi-Fi router, scan the router looking for specific vulnerabilities such as a weak password and exploit it by deploying tools to intercept and read the victim’s transmitted data. The data must be unencrypted so the attack can read and act upon it.

Other: Active eavesdropping, general term for when a perpetrator positions himself in a conversation between a user and an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some defences from MITM attacks?

A

Making sure HTTPS is always in the URL bar of websites being visited, be wary of potential phishing emails from attackers asking to update passwords or any other login credentials, and direct connections to public Wi-Fi routers should be avoided if possible.

[Possibly also encryption and hashing data before transit]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Spoofing Attack?

A

A spoofing attack is when an attacker impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some common types/methods for spoofing attacks? [4]

A

IP address spoofing
ARP spoofing
DNS server spoofing
HTTPS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some defences against Spoofing Attacks?

A

Packet Filtering - inspect packets that are transmitted

Avoiding Trust Relationships - develop as little as possible protocols that rely on trust

Use Spoofing Detection Software - many programs available that do this particularly ARP Spoofing

Use Cryptographic Network Protocols - Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure (HTTPS) and other secure communications protocols bolster spoofing attack prevention efforts by encrypting data before it is sent and authenticating data as it is received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Replay Attack?

A

A replay attack occurs when an attacker intercepts and then delays or resends a secure data communication to misdirect the receiver into doing what the attacker wants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly