Explain common network-related security threats Flashcards
(9 cards)
What is eavesdropping in network security?
An eavesdropping attack, also known as network sniffing, occurs when a hacker captures network packets sent and received by workstations connected to the network.
Eavesdropping attacks can compromise sensitive data such as passwords.
What can eavesdropping attacks lead to?
They can lead to other, more damaging attacks.
This is due to the compromise of sensitive information.
What is a denial of service (DoS) attack?
A DoS attack limits the function of a network app or renders a network resource unavailable.
Hackers exploit vulnerabilities in the target app to initiate this type of attack.
How do hackers typically perform DoS attacks?
By overloading a service that replies to network requests with a large number of fake requests.
An example of such a service is the Domain Name System (DNS).
What is a distributed denial of service (DDoS) attack?
A version of a DoS attack.
It involves multiple systems attacking a single target.
What is port scanning?
Port scanning is when attackers query hosts for open ports to identify services running on a computer.
Apps using TCP/IP protocol utilize TCP or UDP ports for this purpose.
What do attackers do once they identify an open port?
They can use other attack techniques to access the services running on the computer.
This can lead to further exploitation of the network.
What is a man-in-the-middle (MITM) attack?
A MITM attack occurs when a network attacker impersonates a legitimate host and intercepts communications between two hosts.
The attacker can view and modify the data in transit.
What is the purpose of a man-in-the-middle (MITM) attack?
To intercept and potentially modify communications intended for a destination host.
This can lead to unauthorized access to sensitive information.