1.0 - Threats, Attacks, & Vulnerabilities Flashcards
(199 cards)
Define
Typosqautting
A type of URL hijacking, using a misspelled version of a legitimate website URL
Define
Pharming
• Like phishing, but harvesting large groups of people
• Often utilizes a poisoned DNS server or client vulnerabilities
• Relatively rare, but they do occur
Define
Vishing
• Voice phishing, done over phone or voicemail
• Caller ID spoofing is common
Define
Smishing
• SMS phishing, performed via text message
• Caller ID spoofing is common
Define
Spear phishing
• Target phishing attacks, going after a very specific person or group.
• Utilize inside information, or public information gathered through reconnaissance, to make the attack more believable
Define
Whaling
• A spear phishing attack with a large target such as a CEO or CFO
• Typically for the purpose of getting funds from someone with access to a large bank account
Define
Dumpster Diving
• Gather personal details by going through trash, to use for phishing attacks and impersonation
How to Protect against Dumpster Diving?
• Shred or burn your documents
• Secure your garbage
Define
Shoulder Surfing
• Looking over someone’s shoulder to view private information, passwords, etc.
• Can be done from a distance using binoculars, telescopes, webcam monitoring
How to protect against Shoulder Surfing?
• Be aware of surroundings
• Use privacy filter (screen that blocks view from angles)
• Keep monitor facing away from windows, hallways
• Don’t do sensitive work in public area
Define
Watering Hole Attack
• When you can’t attack an organization directly, you can attack a third-party that is associated with them.
• The third party is termed the “watering hole.”
• Ex, hijack a website that the victim uses.
• The attack is looking for specific victims, but often all visitors of the watering hole are infected / attacked.
How to protect against a Watering Hole Attack?
• Make sure your own defenses are very good
• Use a multi-layered defense
Define
SPIM
Spam over Instant Messaging
Define
Spam
• Unsolicited messages, typically over email or on forums, etc.
• Can be malicious, but not necessarily so.
• Includes commercial advertising, non-commercial proselytizing, as well as malicious attacks like phishing
What are the problems caused by spam?
• Security concerns
• resource utilization
• storage costs
• management of spam
How to protect against spam?
• It is necessary to combine multiple approaches.
• Mail gateways / filters
• Utilize Allow lists
• SMTP standards checking (blocking anything not following RFC standards)
• rDNS check
• Tarpitting
• Recipient filtering
Define
Recipient Filtering
Blocking all email not addressed to a valid recipient
Define
rDNS
• Reverse DNS
• Confirms if a sender’s domain matches their IP address
Define
Tarpitting
• Intentionally slowing down server performance to slow down / mitigate an attack
• Ex. slow delivery of e-mail to prevent mass mailed spam, so the spammers move on from you
Define
Tailgating
• use an authorized person to gain unauthorized access to a building
• May involve social engineering such as walking with your hands full, posing as a 3rd party vendor, etc.
How to protect against tailgaiting?
• A no-tailgating policy
• Policy that all visitors must wear badges
• Mechanically prevent more than one person from entering at a time, such as a rotary, vestibule, airlock
What are some principles of social engineering?
• Authority
• Intimidation
• Scarcity
• Urgency
• Consensus / social proof
• Familiarity / Liking
• Trust
Define
Virus
• Malware that can reproduce itself
• Requires human interaction to execute
Define
Worm
A virus that can replicate and jump from machine to machine without requiring any human interaction