Revision lecture Flashcards
(17 cards)
Man-in-the-Middle (MITM)
Intercepting and potentially altering communication between two parties
DoS/DDoS
Overwhelming a network or service with traffic to make it unavailable
Privilege Escalation
gaining higher access than intended
Code Injection
inserting malicious code into legitimate
programs
Malware
Worms, viruses, trojans, bots, ransomware
Buffer Overflow
exploiting memory errors to gain control
Phishing
tricking users into revealing sensitive information
Where Problems Originate
Code, applications, configurations, networks, and users
All layers of the system can introduce vulnerabilities
What is Social Engineering?
The use of psychological manipulation to trick individuals into
giving up confidential information or access.
Focuses on exploiting human behavior rather than technical
flaws
Phishing
fake emails/websites to steal credentials
Pretexting
creating a fabricated scenario to obtain data
Baiting
offering something enticing to get victims to ac
Quid Pro Quo
offering a service in exchange for information
Tailgating
following someone into a secure area
Why Do People Fall for Social Engineering?
Greed – offers that are too good to be true
Impersonation – attackers pretending to be someone trusted
Authority – false claims of power or position
Urgency – pressure to act quickly, reducing critical thinking
Programming Flaws that Lead to Security Issues
Code Injection: Attacker injects malicious code that is
executed by the application
Uninitialized Variables: Can take on unsafe default values,
causing unintended behavior
Stack Vulnerabilities: The stack stores local variables and
the return address