Chapter 2 - Access Control Attacks Flashcards

1
Q

Access Control Attacks

A

Several methods can be used to attack a system’s access control mechanism as a means for gaining access to the system. Usually, the motivation for such an attack is to steal information, alter information, or gain access to functions. Persons who desire to launch an attack usually do not possess a working userid and password, so they must resort to an attack in order to access the desired information or function.
The types of attacks include:
- Buffer overflow
- Script injection
- Data remanence
- Denial of service
- Dumpster diving
- Eavesdropping
- Emanations
- Spoofing and masquerading
- Social engineering
- Phishing, spear phishing, and - whaling
- Pharming
- Password guessing
- Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer overflow

A

A buffer overflow attack is an attempt to cause a malfunction of an application by sending more data to a program than it was designed to handle properly, causing the program to malfunction or abort. If a program does not properly check input data, a too-long input string can fill the input buffer and overwrite other memory locations in the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Script Injection

A

A script injection attack (also known as code injection) is similar to a buffer overflow attack. Script injection occurs when software programs do not parse input data for script commands, and they inadvertently execute the script commands in subsequent processing steps.

A common form of script injection is known as SQL injection, whereby specially crafted SQL statements can be inserted into an input field, causing the database server on the back end to execute the injected SQL statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Remanence

A

Data remanence refers to data that remains on a storage device, often unintentionally.
Data can remain on a device even after a user “removes” the data. This data can fall into the hands of others, sometimes to the detriment of the original owner of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of Service

A

An attack that disables a service or makes it unreachable to its users is a denial-of-service (DoS) attack. There are two primary ways of carrying out a DoS attack:
- Sending a flood of messages to a service that is so heavy that legitimate use of the service is all but impossible.
- Sending specially crafted messages that cause the application or service to malfunction or abort, making it unavailable for legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dumpster Diving

A

Some organizations are not careful about the printed matter that they discard. They throw documents containing sensitive information into recycling or trash bins. Someone who attempts to find discarded documents in the trash is dumpster diving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eavesdropping

A

Eavesdropping takes many forms, but the effect is the same: people who desire sensitive information will attempt to obtain it by observing communications:
- Network Sniffing
- Wireless Network sniffing
- Key logging
- Shoulder surfing
- Mobile calls and conversations in public spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Emanations

A

Computer and network hardware devices employ high-speed electronics that can emanate
electromagnetic radiation (EMR). Sometimes these emanations contain data that can be sensitive in nature. Three examples of EMR emanations are:
- Network cabling.
- Computer monitors
- Processor chips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spoofing and Masquerading

A

An attack can be successful if the attacker pretends to be someone (or something) they are not. Weaknesses in the TCP/IP protocol make it fairly easy for a system to create messages that claim to be originating from any IP address. This spoofing can fool the target system into thinking that the messages are originating from a trusted system instead of from an untrusted system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

A

Social engineering is a form of manipulation and psychological manipulation that cybercriminals and malicious actors use to deceive individuals or organizations into divulging confidential information, performing certain actions, or making security-related mistakes. It relies on human psychology and social interactions rather than technical exploits to achieve its goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Phishing is a cyberattack technique in which malicious actors use deceptive tactics to trick individuals into revealing sensitive information, such as usernames, passwords, credit card numbers, or other personal data. Phishing attacks typically involve impersonating trusted entities or organizations, such as banks, government agencies, social media platforms, or reputable companies, to manipulate victims into taking actions that benefit the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pharming

A

Pharming is a cyberattack technique that involves redirecting or manipulating the domain name system (DNS) or other means to lead users to a fraudulent website without their knowledge or consent. The goal of pharming attacks is to deceive users into visiting malicious websites that often mimic legitimate ones. Once on these fraudulent websites, victims may unwittingly provide sensitive information, such as login credentials, personal data, or financial information, to cybercriminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password Guessing

A

Password guessing is a manual or automated technique in which an attacker attempts to log into a user’s account by trying different passwords until the correct one is discovered. This is often done by trying common or likely passwords based on the user’s information or patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password Cracking

A

Password cracking is the process of using automated tools and techniques to systematically test a large number of possible passwords in an attempt to guess the correct one. Unlike password guessing, which relies on the attacker’s knowledge, password cracking often involves dictionary attacks, brute force attacks, or other sophisticated methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious Code

A

Malicious code, also known as malware, refers to any software or code intentionally designed and written with malicious intent to harm, compromise, or exploit computer systems, networks, or users’ devices. Malware is a broad category that encompasses various types of malicious software, and its purpose can range from stealing sensitive information to disrupting computer operations or even damaging hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly