Cyber Attacks #3 Flashcards
(15 cards)
What is the aim of an DoS attack?
Make service unavilable to users
How does DoS usually accomplish its aim?
Overload service’s resources
How does DoS overloading occur?
Service request flooding
What makes DoS a DDoS attack?
Flooding traffic generated by many different sources
Describe what botnets are in DDoS attacks?
Groups of computers networked together to cause DDoS attack
What are botnet groups built from?
Vulnerable systems, with no concern for who owners are
How are botnets controlled?
Command and Control Infrastructure
What is botnet as a service?
Owners of botnets may rent them to other attacks to make money
What are 3 reasons why IoT devices are being used for botnets?
IoTs have poor practices, like using open ports. IoTs have no built in auto-firmware update system, so vulnerabilites left unpatches. IoT devices are not looked at much once installed, so owners don’t know when devices are used maliciously.
What does Mirai do?
Scans internet for vulnerable IoT devices
What are Influence Campaigns?
Attacks and releasing info, aimed to influence people’s opinions
How are botnets used on social media platforms?
Each bot is an account taking actions to spread information
What is web defacement?
Changing the appearance of a website
What are 2 criteria that are used to choose targets for web defacement?
How easy the target is to hack, Expected media attention
What happens in a supply chain attack?
The attakcer compromises the weakest link in the supply chain, and reaches the target from there