Vulnerabilities of data transmission Flashcards

1
Q

Sniffing Attack(property)

A

Tapping network traffic or routing traffic to a target where it can be captured, analysed and monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sniffing Attack(Why problem, or why important?)

A

Because any network packet having information in plain text can be intercepted and easily read by attackers. Connecting to public networks will have this risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sniffing Attack(Give an example, or give a definition)

A

This information could be usernames, passwords, secret codes, baking details or any information which is of value to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sniffing Attack(Describe a measure to prevent)

A

Encrypting data to ensure all data that leaves the system can not be read even if the traffic is being sniffed(hackers could run cryptographic attacks to get something out of the data though). The use of secured protocols ensures the traffic is encrypted and renders security for traffic.

Networks should be scanned for any kind of intrusion attempt or rogue devices that may be set up to capture traffic. Network admins should monitor network devices as well to ensure they are authorised and have not been infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Man in the middle attack(property)

A

Victim, the Entity with which the victim is trying to communicate, the man in the middle(who is intercepting the victim’s communications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Man in the middle attack(Why a problem or why important)

A

Interception - attackers look to gain access to a poorly secured Wi-Fi router, can scan router looking for specific vulnerabilities such as weak password. Once they find vulnerability they can exploit it by deploying tools to intercept and read victims transmitted data(logins, bank info etc.)
Decryption - Victims intercepted data must then be unencrypted, so that attacker can read and act upon it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man in the middle attack(give an example, or give a definition)

A

MITM sent you an email, making it appear legit(phishing)
MITM created a website that looks like a banks website, so you wouldn’t hesitate to enter your login credentials after clicking the link in the email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Man in the middle attack(Describe a measure to prevent)

A

Make sure HTTPS is in website.
Be wary of phishing emails
Avoid direct connections to public Wi-Fi routers(use a VPN)
Internet security should be installed on systems
Be sure that home Wi-Fi networks are secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spoofing attacks(property)

A

When an attacker impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spoofing attack(give example or definition)

A

Common spoofing attack methods:
IP address
ARP
DNS server
HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing attack(measure to prevent)

A

Packet filtering - inspect packets as they are transmitted across network
Useful in IP address spoofing attack prevention as they are capable of filtering and blocking packets with conflicting source address info

Avoid trust relationships(allow users in one domain to access resources in another domain) - protocols should be developed that they rely on these as little as possible
Easier for attackers because trust relationships only use IP addresses for authentication

Use spoofing detection software - work by inspecting and certifying data before its transmitted and blocking data appearing to be spoofed

Use cryptographic network protocols - TLS, SSH, HTTPS and other secure communications protocols bolster spoofing attack prevention efforts by encrypting data before its sent and authenticating data as its received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Address spoofing

A

Every device capable of connecting to internet has IP address
By spoofing an IP address, an attacker can trick you into thinking your interacting with a website or someone you know, perhaps giving the attacker access to information you would otherwise not share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP spoofing

A

Address Resolution protocol - used to resolve IP addresses to MAC addresses for transmitting. data
Attacker sends spoofed ARP messages across a LAN to link their MAC address with IP address of legit member of network
Results in. data that’s intended for the hosts IP address getting sent to the attacker instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS spoofing

A

Malicious party modifies the DNS server in order to reroute a specific domain name to a different IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS spoofing

A

Attacker can fool a users browser into believing its visiting a trusted website when its not.
By redirecting the users browser to an unsecured website, the attacker can monitor the users interactions with that website and possibly steal personal info that they are sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Replay Attacks(property)

A

Occurs when an attacker intercepts and then delays or resends a secure data communication to misdirect the receiver into doing what the attacker wants

17
Q

Replay Attacks(why problem or why important)

A

Attacker doesn’t even need advanced skills to decrypt the data communication after capturing it from the network.
Attacker could be successful simply by delaying or resending the whole thing

18
Q

Replay attack(give example or definition)

A

Alice wants to request that bob transfers £1000 to Alices account
Alice sends a legit message to bob to request transfer
Bob believes the request from Alice is legit and sends £1000 to alices account(but alices legit message was intercepted)
The attacker resends Alices message to bob
Bob believes the 2nd request from Alice is legit and sends another £1000
This time, the attacker is able to divert the £1000 sent by bob into their own account

19
Q

Replay attack(measure to prevent)

A

Both sender and receiver should establish random session keys that are valid for one transaction only and cannot be used again.

Adding timestamps to all messages prevents attackers from resending messages sent longer ago than a certain length of time, thus reducing window of opportunity for an attacker to eavesdrop, siphon off the message and then resend it

Use a OTP for each transaction that’s only used once and discarded. Esnure that even if a message is duplicated and resent by an attacker, the encryption code has expired and no longer works