Explain Attacks, Threats, and Vulnerabilities Flashcards
Lesson 16A (41 cards)
Relationship between vulnerability, threat, and risk.
Example of a phishing email. On the right, you can see the message in its true form as the mail client has stripped out the formatting (shown on the left) designed to disguise the nature of the links. (Screenshot courtesy of CompTIA.)
Using a command & control (C&C) network to operate a botnet of compromised hosts and
coordinate a DDoS attack.
If authentication credentials are transmitted in cleartext, such as the unencrypted version of the
IMAP mailbox access protocol, it is a simple matter for the credentials to be intercepted via packet
sniffing.
Hashcat password cracking utility. This example uses a mask to speed up a brute force attack. The attacker can use a mask by learning or guessing likely facts about how the target chooses a password, such as its length and likelihood of being a variation on a simple word or phrase.
Information security ensures
confidentiality, integrity, and availability (CIA) of data, while cybersecurity protects systems from attacks; security assessments evaluate vulnerabilities, threats, and risks to strengthen defenses.
vulnerability
is a weakness in a system that a threat actor could exploit, arising from issues like misconfigurations, outdated patches, untested updates, protocol misuse, poor network design, weak physical security, insecure passwords, and software flaws such as unchecked user input.
Non-compliant systems
configuration baseline defines best practices hardening a system to minimize vulnerabilities by reducing its attack surface—the entry points a threat actor could exploit. Non-compliant systems have deviated from this baseline, and vulnerability scanners help detect them.
unprotected system
lacks or has misconfigured technical security controls like antivirus scanners, firewalls, or intrusion detection systems, increasing its attack surface and exposing more vulnerabilities.
software vulnerability
is a flaw that can be exploited to bypass security or crash an application, potentially allowing attackers to install malware.
zero-day vulnerability
is exploited before a fix is available, leaving systems exposed.
exploit
is malicious code that uses a vulnerability to compromise a system.
unpatched systems
While zero-day exploits are rare but dangerous, a greater risk comes from unpatched systems, which lack critical OS and application updates, and end-of-life (EOL) systems, where vendors no longer provide support or security fixes.
BYOD (Bring Your Own Device)
allows employees to use personal mobile devices for corporate access but complicates security by making it harder to enforce standardized configurations and compliance, ultimately expanding the network attack surface.
Social engineering
is a tactic where threat actors manipulate people into revealing confidential information or granting unauthorized access, often by persuasion or intimidation. Preventing these attacks requires awareness of common social engineering techniques.
Impersonation
is a social engineering tactic where an attacker creates a pretext scenario to engage with an employee, often pretending to be IT support to persuade them into revealing sensitive information, such as passwords, through trust-building, intimidation, or hoaxes.
Dumpster diving
is a technique where attackers search discarded documents or media to collect sensitive information that strengthens social engineering attacks, making impersonation attempts more credible.
Shoulder surfing
is a social engineering attack where a threat actor observes a user entering secure information like a password or PIN, either in person or remotely using binoculars, CCTV, or other surveillance methods.
Tailgating
occurs when an attacker follows closely behind someone authorized to enter a secure area,
piggybacking
involves gaining access with an employee’s permission, often using impersonation or deception, such as pretending to be a cleaning crew member or claiming to have forgotten a badge.
Phishing
is a social engineering attack where threat actors send spoofed emails or messages to trick users into performing actions like installing malware or giving remote access. Some phishing campaigns use fake websites mimicking legitimate ones to capture login credentials.
Phishing Variants include:
spear phishing (targeted attacks using personal details), whaling (focused on high-level executives), and vishing (voice-based scams). An evil twin attack operates similarly but uses a rogue wireless access point with a deceptive SSID or spoofed captive portal to steal user authentication data.
threats
Early cybersecurity relied on detecting static threats like computer viruses through signature-based scanning, but adversaries developed techniques to evade detection. Modern security emphasizes behavioral analysis, assessing threat actors’ location, intent, and capability to counter evolving attacks.
External threat actors
External threat actors lack authorized access and rely on malware or social engineering