Malicious Activity Flashcards
(52 cards)
What are the evolving concerns in the digital age?
Cyber attacks, increasing in frequency and sophistication
The digital landscape is constantly changing, resulting in new and more advanced cyber threats.
What is the first step to effective prevention and mitigation of cyber threats?
Understanding Cyber Threats
Awareness of the tactics, techniques, and procedures employed by cybercriminals is crucial.
What are the variants of Distributed Denial of Service (DDoS) attacks?
- Denial of Service
- Amplified DDoS
- Reflected DDoS
What are the types of Domain Name Server (DNS) attacks?
- DNS Cache Poisoning
- DNS Amplification
- DNS Tunneling
- Domain Hijacking
- DNS Zone Transfer
What is a Directory Traversal Attack?
Injection attack when attacker inserts malicious cose through an application interface
What does a Privilege Escalation Attack involve?
Exploiting system vulnerability to gain elevated access
What is a Replay Attack?
Malicious or fraudulent repeat/delay of a valid data transmission
What is Session Hijacking?
Attacker takes over a user session to gain unauthorized access
What are Malicious Code Injection Attacks?
Introduction of harmful code into a program or system
What are some Indicators of Compromise (IoC)?
- Account lockout
- Concurrent session usage
- Blocked content
- Impossible travel
- Resource consumption
- Inaccessibility
- Out-of-cycle logging
- Published documents indicating hacking
- Missing logs
What is a Denial of Service (DoS) attack?
An attack that attempts to make a computer or server’s resources unavailable
What is a Flood Attack?
- Ping Flood
- SYN Flood
What is a Permanent Denial of Service (PDOS) Attack?
Exploits security flaws to break a networking device permanently by re-flashing its firmware
What is a Fork Bomb?
Attack creates a large number of processes, consuming processing power
What is a Distributed Denial of Service (DDoS) attack?
Malicious attempt to disrupt the normal functioning of a network by overwhelming it with a flood of internet traffic
What is a DNS Amplification Attack?
Allows an attacker to initiate DNS requests from a spoof IP address to flood a website
What is the purpose of a Black Hole or Sinkhole in DoS prevention?
Routes attacking IP traffic to a non-existent server through a null interface
What is DNS Cache Poisoning?
Corrupts a DNS resolver’s cache with false information
What is DNS Tunneling?
Encapsulates non-DNS traffic over port 53
What is Domain Hijacking?
Unauthorized change of domain registration
What is a Directory Traversal Attack?
An injection attack that allows access to commands, files, and directories
What is Arbitrary Code Execution?
Vulnerability that allows an attacker to run their code without restrictions
What is Remote Code Execution?
Type of arbitrary code execution that occurs remotely
What is the difference between Vertical and Horizontal Privilege Escalation?
- Vertical: From normal user to higher privilege
- Horizontal: Accessing resources at the same level