Lecture 2 - Cyberattack Basics Flashcards

1
Q

What is a cyber attack?

A

any offensive maneuver that
targets computer information systems, computer networks, infrastructures, or personal computer devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of attacks?

A

active attack
passive attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an active attack?

A

An attack that attempts to alter the system resources or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of an active attack?

A

DOS, Spoofing , MITM, ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a passive attack?

A

attempts to learn or make use of information from the system but doesn’t affect the system resources

(just listening or monitoring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of a passive attack?

A

keyboard logger , wiretaping, fiber tapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 forms of cyber threats?

A
  • environmental (break in, physical damage)
  • unintentional (human error , poor training , insufficient documentation)
  • intentional (typically internal e.g. staff caused)
  • external (hackers etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most common security problems?

A
  • Snooping
  • Modification
  • Masquerading or spoofing (impersonation)
  • Repudiation (denial of sending / creating information)
  • Denial of receipt (False denial of receiving information)
  • Delay (Temporary inhibition of access to services or information)
  • Denial of service (Long-term or permanent inhibition of access to
    services or information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does DOS stand for?

A

Denial Of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DOS?

A

an attempt to compromise availability by hindering or blocking completely the
provision of some service

  • typically exhausts system resources (e.g. flooding a web server with endless requests, so the server can’t respond in a timely manner)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What resources are targeted in a cyberattack?

A
  • network bandwidth
  • system resources
  • application resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most common resource targeted now?

A

Network bandwidth as most cyber attacks are external. Bandwidth is also extremely limited, so easy to destabilise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly