1.8.1 Forms of Attack Flashcards

1
Q

Passive attack

A

When a hacker eavesdrops on a network by ‘sniffing’ the data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active attack

A

When someone uses malware or other technical methods to compromise a network’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering

A

When a person is exploited into giving away critical information that gives access to the network or accounts.

Insider attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider attack

A

When someone in an organisation gives away access details or sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration testing

A

Penetration testing identifies vulnerabilities in a network’s security by attempting a controlled attack on the network.
This usually involves carrying out multiple types of attack to see which is most successful.
Penetration testing is done by the organisation itself, or an external organisation or contractor they have hired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Good penetration testing

A

A good penetration test will check:
Technical vulnerabilities.
Likelihood of social engineering.
A test of damage recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Motivation for penetration tests

A

Organisations choose to perform penetration testing to try to find vulnerabilities before criminals do.
If an organisation can find and fix a bug before it is exploited, it can save time and money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly