Week 10 Flashcards

1
Q

What are the 3 types of hacker?

A
  • White hat hacker: An IT security expert hired by organisations to identify security vulnerabilities.
  • Black hat hacker: Groups or individuals that cause damage, steal data, or compromise privacy
  • Gray hat hacker: Abide by a code of ethics all their own
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerability?

A

A vulnerability is a weakness of a system, process , or architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an exploit?

A

An exploit is the act of taking advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a zero-day exploit?

A

A zero-day exploit (aka zero-day attack) is one that takes advantage of a software vulnerability before the the software developer is aware of the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

Social engineering involves manipulating social relationships to circumvent network security measures and gain access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an insider threat?

A

An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an insider threat?

A

An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DoS attack?

A

A DoS (denial-of-service) attack occurs when an intruder issues a flood of broadcast ping messages preventing legitimate users from accessing normal network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of DoS attacks?

A
  • Distributed DoS (DDoS) attack - are orchestrated through several sources, called zombies
  • DRDoS (Distributed Reflection DoS) - pings are bounced off uninfected computers (reflectors) before being directed at target
  • Amplified DRDoS attack – can be amplified when conducted using small, simple requests that trigger very large responses from the target
  • PDoS (permanent DoS) attack – an attack that damages a device’s firmware beyond repair
  • Friendly DoS attack - An unintentional DoS attack has no malicious intent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the other types of attacks (other than DoS)?

A
  • On-path attack - relies on intercepted transmissions and can take several forms (previously called a MitM (man-in-the-middle)attack)
  • Deauth (deauthentication) attack – the attacker sends faked deauthentication frames to the AP, the client, or both, to trigger the deauthentication process and knock one or more clients off the wireless network
  • Insecure protocols and services – certain TCP/IP protocols are inherently insecure
  • DNS poisoning (DNS spoofing) – by altering DNS records on a DNS server, an attacker can redirect Internet traffic from a legitimate to a phishing website
  • Back doors – security flaws that allow unauthorised users to gain access to the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different types of Malware?

A
  • Virus – a program that replicates itself with the intent to infect more computers
  • Trojan horse (Trojan) – a program that disguises itself as something useful, but actually harms your system
  • Worm – a program that runs independently and travels between computers and across networks
  • Bot – a program that runs automatically without requiring a person to start or stop it
  • Ransomware – a program that locks a user’s data or computer system until a ransom is paid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of Malware?

A
  • Encryption – some malware is encrypted to prevent detection
  • Stealth – some malware disguises itself as legitimate programs
  • Polymorphism – changes its characteristics every time it’s transferred to a new system
  • Time dependence – some malware is programmed to activate on a particular date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of social engineering?

A

Examples of social engineering include:
- Phishing
- Baiting
- Quid pro quo
- Tailgating
- Piggybacking
- Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly