Threat Vectors and Attack Surfaces Flashcards
(11 cards)
What is a Threat Vector?
Means or pathways that an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action
Examples include phishing emails, malware, and unsecured networks.
What is an Attack Surface?
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
What are the different types of threat vectors?
Messages, Images, Files, Voice calls, Removable devices, Unsecured networks
What threats can messages do?
these threats are delivered via email, SMS text messaging, or other forms of instant messaging
What threat can images do?
it involves the embedding of malicious code inside of an image file by the threat actor
What threat can files do?
The files, often disguised as legitimate documents or software, can be transferred as email attachments, through file-sharing services, or hosted on a malicious website
What threat can voice calls do?
It’s used to trick victims into revealing their sensitive information to an attacker
What threat can removable devices do?
Threats delivered via removable devices such as USB
What techniques can an attacker use to exploit Bluetooth?
BlueBorne and BlueSmack
What is BlueBorne?
Set of vulnerabilities in Bluetooth that allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction
What is BlueSmack?
Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device