Attacks Flashcards

1
Q

Interception attacks

A

Allow unauthorized users to access your data, applications, or environments. If done right can be difficult to detect. (Confidentiality) (Data at rest or in motion)
Ex. Unauthorized file viewing, reading someone else’s email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interruption attacks

A

Make your assets unusable or unavailable to you on a temporary or permanent basis. (Availability / sometimes Integrity)
Ex. DoS on email server is availability. An attack on the processes on which a database runs to prevent the access of said data could be considered an integrity attack bc of the possible corruption of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Modification attacks

A

Involve tampering with an asset. (Integrity/ sometimes Availability)
Tampering of data = Integrity attack
If the file is a configuration file that acts as a web server = Availability attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fabrication attacks

A

Generating data, processes, communications, or other similar material with a system. (Integrity / sometimes availability)
Generating enough additional processes that consume resources you would be conducting an availability attack by rendering the service unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly