Chapter 7: Protecting Against Advanced Attacks Flashcards
(61 cards)
What is a Denial-of-Service (DoS)?
An attack that makes a service unavailable by overwhelming it with traffic.
What is a Distributed Denial-of-Service (DDoS)?
A DoS attack launched from multiple systems simultaneously.
What is Resource Exhaustion?
Draining a system’s resources to degrade its performance or outright cause it to crash.
What is Reflected DDoS?
A DDoS that tricks legitimate servers into flooding a target with responses.
What is Amplified DDoS?
A DDoS that uses small requests to trigger larger responses from servers.
What is SYN Flood?
A DoS attack that overwhelms a server by not completing TCP handshakes.
What is Forgery?
An attack that occurs when an attacker creates a fake identity, certificate, file, or other object in an attempt to fool unsuspecting users or systems.
What is Spoofing?
An example of forgery, occurs when one person or entity impersonates someone or something else (IP Spoofing, MAC Spoofing, etc.).
What is On-Path Attack? AKA man-in-the-middle attack.
An attack where the attacker intercepts and potentially alters communications.
What is an Attacker-in-the-browser attack?
A malware-based attack that manipulates browser sessions in real-time, often to intercept or alter sensitive data like banking transactions.
What is SSL Stripping?
Downgrading HTTPS to HTTP to intercept unencrypted data.
What is DNS Poisoning?
Tampering with DNS records to redirect users to fake sites.
What is a Pharming Attack?
Redirecting users to malicious websites through DNS manipulation.
What is URL Redirection?
Sending users to different, often malicious, websites without their knowledge.
What is Domain Hijacking?
Taking unauthorized control of a domain name.
What is DNS Filtering?
Blocking harmful websites by preventing DNS resolution.
What is a DNS Sinkhole?
A fake DNS server that traps malicious traffic for analysis.
What is a Replay Attack?
Reusing captured data packets to gain unauthorized access.
What is Credential Replay?
Reusing valid login credentials to gain unauthorized access.
What is Input Validation?
Checking user input to prevent malicious data from entering a system.
What are some good practices when verifying user input?
Verifying proper characters, blocking HTML code, prevent the use of certain characters, and implementing boundary/range checking.
What are Race Conditions?
A flaw where two or more processes access shared data at the same time, leading to unpredictable results or vulnerabilities.
What is Time of Check to Time of Use (TOCTOU)
A flaw where a system’s state changes between checking a condition and using it, leading to security issues.
What is Error Handling?
The process of managing unexpected conditions in software to ensure stability and security.