Cyber Attacks #3 Flashcards

(15 cards)

1
Q

What is the aim of an DoS attack?

A

Make service unavilable to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does DoS usually accomplish its aim?

A

Overload service’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DoS overloading occur?

A

Service request flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes DoS a DDoS attack?

A

Flooding traffic generated by many different sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe what botnets are in DDoS attacks?

A

Groups of computers networked together to cause DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are botnet groups built from?

A

Vulnerable systems, with no concern for who owners are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are botnets controlled?

A

Command and Control Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is botnet as a service?

A

Owners of botnets may rent them to other attacks to make money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 reasons why IoT devices are being used for botnets?

A

IoTs have poor practices, like using open ports. IoTs have no built in auto-firmware update system, so vulnerabilites left unpatches. IoT devices are not looked at much once installed, so owners don’t know when devices are used maliciously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Mirai do?

A

Scans internet for vulnerable IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Influence Campaigns?

A

Attacks and releasing info, aimed to influence people’s opinions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are botnets used on social media platforms?

A

Each bot is an account taking actions to spread information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is web defacement?

A

Changing the appearance of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 criteria that are used to choose targets for web defacement?

A

How easy the target is to hack, Expected media attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens in a supply chain attack?

A

The attakcer compromises the weakest link in the supply chain, and reaches the target from there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly