Chapter 10 - Network-Based Threats, Attacks and Vulnerabilities Flashcards

1
Q

Threats

A

The expressed potential for the occurrence of a harmful event such as an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks

A

Actions taken against a target resource with the intention of doing harm:
- DoS
- DDoS
-Teardrop
- Sequence Number
- Smurf
- Ping of death
- SYN flood
- Worms
- Spam
- Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DoS

A

Denial of Service attack is an attempt to incapacitate a target system or resource:
- high volume
- malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DDoS

A

Distributed Denial of Service attack is designed to overwhelm a target with a vast amount of incoming traffic that originates from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sequence Number

A

A sequence number attack consists of an attacker who attempts to hijack or disrupt an existing TCP session by injecting packets that pretend to originate from one of the two computers in the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smurf

A

A smurf attack consists of a large number of forged ICMP echo requests. The packets are sent to a target network’s broadcast address, which causes all systems on the network to respond. The packets are forged with the ‘from’ address of the target system, resulting in a large number of ICMP echo reply messages from all of the systems on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PoD

A

Ping of Death attack is an attack where the attacker sends a ping packet of length 65,535 bytes to the target system. The TCP/IP protocol will fragment this packet as it travels through the network. It is then reassembled on the target system, causing a buffer overflow.

historic attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SYN Flood

A

A SYN flood attack is a denial-of-service attack in which the attacker sends a large number of SYN packets to the target system. This attack is designed to overwhelm the resources of the target system until it is unable to respond to legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

A worm is a type of malware that has the means for automatic self-replication.
They spread by exploiting known vulnerabilities that permit the malicious program to infect
new victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spam

A

Spam is the common term for unsolicited commercial e-mail (UCE).
Spam greatly adds to the volume of e-mail traffic on the Internet. Often, the volume of spam is so high that over 90 percent of all e-mail on the Internet is spam.

Spam’s effect on networks is the degradation of performance through network and e-mail
server congestion, as well as the machine cycles required to filter and remove spam messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Phishing is a type of spam where the contents of a message is designed to masquerade as a trustworthy organization, with the intention of defrauding recipients by tricking them into downloading and executing a malicious program or luring them to an authentic-looking website where they will enter secret information such as userids, passwords, bank
account etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilities

A

Vulnerabilities are defined as weaknesses that make targets susceptible to attack, resulting in
harm or compromise of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of Vulnerabilities

A
  • unnecessary Open Ports
  • Unpatched Systems
  • Poor and outdated configurations
  • Default Passwords
  • Exposed cabling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Countermeasures

A

Network countermeasures refer to defensive strategies and actions taken to protect computer networks, systems, and data from various threats and vulnerabilities. These countermeasures are designed to prevent unauthorized access, mitigate risks, and respond to security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Countermeasures examples

A
  • Access Control List
  • Firewalls
  • Intrusion Detection Systems (IDS)
  • Intrusion Prevention System (IPS)
  • Data Leakage Prevention System (DLP)
  • Network Cabling Protection
  • Anti-Virus Software
  • Private Addressing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly