Module 3 - 03-3 Flashcards
Network attack tactics and defense
What are common network intrusion attacks (4)?
- Malware
- Spoofing
- Packet sniffing
- Packet flooding
How is an organization harmed by attacks (4)?
- Leaking valuable or confidential information
- Damaging an organization’s reputation
- Impact customer retention
- Cost money and time.
Which of the following are common network attacks? Select all that apply.
- Malware
- Proxy servers
- Spoofing
- Packet flooding
- Spoofing, packet flooding, and malware are all common network attacks.
- Malware
- Spoofing
- Packet flooding
- Spoofing, packet flooding, and malware are all common network attacks.
How do Network interception attacks work?
Network interception attacks work by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.
What are attacks that intercept data packets as they travel across a network called?
Interception attacks
What are two types of attacks that are used in network attacks?
- Packet sniffing
- IP spoofing
What is referred to as using hardware or software tools to capture and inspect data in transit?
Packet sniffing
What is a Backdoor attack?
In cybersecurity, backdoors are weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms.
Backdoors are intended to help programmers conduct troubleshooting or administrative tasks.
However, backdoors can also be installed by attackers after they’ve compromised an organization to ensure they have persistent access.
Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a denial of service (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks.
What are are potential consequences of network attacks on an organization?
- Financial: When a system is taken offline with a DoS attack or some other tactic, they prevent a company from performing tasks that generate revenue. Depending on the size of an organization, interrupted operations can cost millions of dollars. Reparation costs to rebuild software infrastructure and to pay large sums associated with potential ransomware can be financially difficult. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.
- Reputation: Attacks can also have a negative impact on the reputation of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.
- Public safety: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a public water system, or even a military defense communication system, the public could face physical harm due to a network intrusion attack.
What does DoS stand for?
Denial of Service (DoS)
Define DoS attack?
An attack that targets a network or server and floods it with network traffic.
What is the objective of a denial of service attack, or a DoS attack?
To disrupt normal business operations by overloading an organization’s network.
The goal of the attack is to send so much information to a network device that it crashes or is unable to respond to legitimate users. This means that the organization won’t be able to conduct their normal business operations, which can cost them money and time. A network crash can also leave them vulnerable to other security threats and attacks.
A class of attacks where the attacker prevents the compromised system from performing legitimate activity or responding to legitimate traffic.
Unlike IP spoofing, however, the attacker will not receive a response from the targeted host. Everything about the data packet is authorized including the IP address in the header of the packet. In IP spoofing attacks, the malicious actor uses IP packets containing fake IP addresses. The attackers keep sending IP packets containing fake IP addresses until the network server crashes.
What doe DDoS stand for?
Distributed Denial of Service Attack (DDoS)
Define DDoS attack?
A kind of DoS attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic.
Use of numerous devices makes it more likely that the total amount of traffic sent will overwhelm the target server.
Remember, DoS stands for denial of service. So it doesn’t matter what part of the network the attacker overloads; if they overload anything, they win.
What is the focus of network level DoS attacks?
To target network bandwidth to slow traffic
What are three common network level DoS attacks?
- SYN flood attack
- ICMP flood attack
- Ping of death
What does SYN stand for?
Synchronize
Define SYN flood attack
A type of DoS attack that simulates the TCP connection and floods the server with SYN packets.
Explain the TCP handshake process to establish a connection between a device and a server
The first step in the handshake is for the device to send a SYN, or synchronize, request to the server.
Then, the server responds with a SYN/ACK packet to acknowledge the receipt of the device’s request and leaves a port open for the final step of the handshake.
Once the server receives the final ACK packet from the device, a TCP connection is established.
How do malicious actors can take advantage of the TCP handshake?
Malicious actors can take advantage of the protocol by flooding a server with SYN packet requests for the first part of the handshake.
But if the number of SYN requests is larger than the number of available ports on the server, then the server will be overwhelmed and become unable to function.
What does ACK stand for?
Acknowledge
What does ICMP stand for?
Internet Control Message Protocol (ICMP)
Define ICMP
An internet protocol used by devices to tell each other about data transmission errors across the network.
Think of ICMP like a request for a status update from a device.
The device will return error messages if there is a network concern.
You can think of this like the ICMP request checking in with the device to make sure that all is well.
Define ICMP flood attack
A type of DoS attack performed by an attacker repeatedly sending ICMP packets to a network server.
This forces the server to send an ICMP packet. This eventually uses up all the bandwidth for incoming and outgoing traffic and causes the server to crash.