12.2 Cats Of Network Attacks Flashcards

1
Q

Confidentiality attacks attempts to make confidential data viewable by an attacker, what are some methods?

A

Packet capture, ping sweep and port scan, dumpster diving, electromagnetic interference interception, wiretapping, man-in-the-middle, social engineering, sending info over overt channels, sending info over covert channels, malware, FTP bounce, phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity attacks attempt to alter data, what are some examples of integrity attacks?

A

Salami Attack, data diddling, trust relationship exploitation, password attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

7 Types of Password Attacks:

A

Trojan horse, packet capture, keylogger, brute force, dictionary attack, bonnet, hijacking a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability attack methods:

A

Logic Bomb, Wireless attacks, Denial of Service, Distributed Denial of Service, TCP SYN Flood, Buffer OverFlow, ICMP Attack’s, Electrical disturbances, Attacks on a System’s Physical Environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 examples of Wireless attacks:

A

Rogue Access Point, Evil Twin, War Driving, Deauthentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two Categories of DoS Attacks:

A

Reflective, amplified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two variants of ICMP DoS Attacks?

A

Ping of Death, Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6 Electrical disturbances:

A

Power Spikes, Electrical Surges, Power Fault, Blackout, Power Sag, Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Environment factors that could be manipulated by an attacker:

A

Temperature, humidity, gas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A business should have a _______ and _______ plan in place so that, in the event of any type of downtime (due to an attack or natural disaster), the company can be back up and running to maintain its business

A

Disaster recovery, business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly