Week 10 Flashcards
What are the 3 types of hacker?
- White hat hacker: An IT security expert hired by organisations to identify security vulnerabilities.
- Black hat hacker: Groups or individuals that cause damage, steal data, or compromise privacy
- Gray hat hacker: Abide by a code of ethics all their own
What is a vulnerability?
A vulnerability is a weakness of a system, process , or architecture
What is an exploit?
An exploit is the act of taking advantage of a vulnerability
What is a zero-day exploit?
A zero-day exploit (aka zero-day attack) is one that takes advantage of a software vulnerability before the the software developer is aware of the vulnerability.
What is social engineering?
Social engineering involves manipulating social relationships to circumvent network security measures and gain access to a system
What is an insider threat?
An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied
What is an insider threat?
An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied
What is a DoS attack?
A DoS (denial-of-service) attack occurs when an intruder issues a flood of broadcast ping messages preventing legitimate users from accessing normal network resources
What are the types of DoS attacks?
- Distributed DoS (DDoS) attack - are orchestrated through several sources, called zombies
- DRDoS (Distributed Reflection DoS) - pings are bounced off uninfected computers (reflectors) before being directed at target
- Amplified DRDoS attack – can be amplified when conducted using small, simple requests that trigger very large responses from the target
- PDoS (permanent DoS) attack – an attack that damages a device’s firmware beyond repair
- Friendly DoS attack - An unintentional DoS attack has no malicious intent
What are the other types of attacks (other than DoS)?
- On-path attack - relies on intercepted transmissions and can take several forms (previously called a MitM (man-in-the-middle)attack)
- Deauth (deauthentication) attack – the attacker sends faked deauthentication frames to the AP, the client, or both, to trigger the deauthentication process and knock one or more clients off the wireless network
- Insecure protocols and services – certain TCP/IP protocols are inherently insecure
- DNS poisoning (DNS spoofing) – by altering DNS records on a DNS server, an attacker can redirect Internet traffic from a legitimate to a phishing website
- Back doors – security flaws that allow unauthorised users to gain access to the system
What are the different types of Malware?
- Virus – a program that replicates itself with the intent to infect more computers
- Trojan horse (Trojan) – a program that disguises itself as something useful, but actually harms your system
- Worm – a program that runs independently and travels between computers and across networks
- Bot – a program that runs automatically without requiring a person to start or stop it
- Ransomware – a program that locks a user’s data or computer system until a ransom is paid
What are the characteristics of Malware?
- Encryption – some malware is encrypted to prevent detection
- Stealth – some malware disguises itself as legitimate programs
- Polymorphism – changes its characteristics every time it’s transferred to a new system
- Time dependence – some malware is programmed to activate on a particular date
What are some examples of social engineering?
Examples of social engineering include:
- Phishing
- Baiting
- Quid pro quo
- Tailgating
- Piggybacking
- Shoulder surfing