Threat Vectors and Attack Surfaces Flashcards

(11 cards)

1
Q

What is a Threat Vector?

A

Means or pathways that an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

Examples include phishing emails, malware, and unsecured networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Attack Surface?

A

Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different types of threat vectors?

A

Messages, Images, Files, Voice calls, Removable devices, Unsecured networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What threats can messages do?

A

these threats are delivered via email, SMS text messaging, or other forms of instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What threat can images do?

A

it involves the embedding of malicious code inside of an image file by the threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What threat can files do?

A

The files, often disguised as legitimate documents or software, can be transferred as email attachments, through file-sharing services, or hosted on a malicious website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What threat can voice calls do?

A

It’s used to trick victims into revealing their sensitive information to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What threat can removable devices do?

A

Threats delivered via removable devices such as USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What techniques can an attacker use to exploit Bluetooth?

A

BlueBorne and BlueSmack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is BlueBorne?

A

Set of vulnerabilities in Bluetooth that allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is BlueSmack?

A

Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly