Week 2C - Security Incidents & Attacks Flashcards

1
Q

Security Incident

A

When a threat and vulnerability coincide, resulting in harm to the information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When is a security incident considered an attack?

A

If the threat involves deliberate human action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 types of attacks?

A

Passive and Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive Attack

A

An attack with no interaction by the attacker other than listening or
observing - attacker does not alter information system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active Attack

A

An attack which requires some action or interaction with the information - to obtain, modify, replicate or
fabricate information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 4 types of Passive Attacks

A

Eavesdropping
Wiretapping
Shoulder Surfing
Network Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Passive Attack - What is Eavesdropping?

A

Listening to conversations of others without their knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive Attack - What is Wiretapping?

A

Eavesdropping over a telephone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive Attack - What is Shoulder Surfing?

A

Watching the actions of others (especially at data entry) without their knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Passive Attack - What is Network Monitoring?

A

When a packet sniffer or network analyzer is used monitor
network traffic to gain knowledge of confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List 7 types of Active Attacks

A

DOS Attacks
DDOS Attacks
Masquerade/Spoofing
Social Engineering
Phishing
MITM Attack
Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active Attack - Denial of Service (DOS) Attack

A

Used to make an information asset or resource unavailable for authorised users - typically done by overloading/flooding service for requests of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Attack - Distributed Denial of Service (DOS) Attack

A

Similar to DOS attacks but uses multiple sources to overload resource so it cannot respond to legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Attack - Masquerade/Spoofing

A

When one entity pretends to be another to deceive others.
Common Types:
Caller ID Spoofing
Email Address Spoofing
Webpage Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active Attack - Social Engineering

A

Using social skills to convince people to reveal information or permit access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Attack - Phishing

A

A combination of Spoofing + Social Engineering
Attacker attempts to gain credentials to access other resources

17
Q

Active Attack - Man in the Middle (MITM) Attack

A

An attacker positions themselves between two entities who wish to communicate to breach security goals

18
Q

Active Attack - Replay Attack

A

When a valid data transmission is captured, stored and retransmitted at a later time. Attacker doesn’t need to know contents of captured information - they can just use it to gain unauthorised access