Threats, Attacks, & Vulnerabilities Flashcards
Define
Typosqautting
A type of URL hijacking, using a misspelled version of a legitimate website URL
Define
Pharming
- Like phishing, but harvesting large groups of people
- Often utilizes a poisoned DNS server or client vulnerabilities
- Relatively rare, but they do occur
Define
Vishing
- Voice phishing, done over phone or voicemail
- Caller ID spoofing is common
Define
Smishing
- SMS phishing, performed via text message
- Caller ID spoofing is common
Define
Spear phishing
- Target phishing attacks, going after a very specific person or group.
- Utilize inside information, or public information gathered through reconnaissance, to make the attack more believable
Define
Whaling
- A spear phishing attack with a large target such as a CEO or CFO
- Typically for the purpose of getting funds from someone with access to a large bank account
Define
Dumpster Diving
• Gather personal details by going through trash, to use for phishing attacks and impersonation
How to Protect against Dumpster Diving?
- Shred or burn your documents
- Secure your garbage
Define
Shoulder Surfing
- Looking over someone’s shoulder to view private information, passwords, etc.
- Can be done from a distance using binoculars, telescopes, webcam monitoring
How to protect against Shoulder Surfing?
- Be aware of surroundings
- Use privacy filter (screen that blocks view from angles)
- Keep monitor facing away from windows, hallways
- Don’t do sensitive work in public area
Define
Watering Hole Attack
- When you can’t attack an organization directly, you can attack a third-party that is associated with them.
- The third party is termed the “watering hole.”
- Ex, hijack a website that the victim uses.
- The attack is looking for specific victims, but often all visitors of the watering hole are infected / attacked.
How to protect against a Watering Hole Attack?
- Make sure your own defenses are very good
- Use a multi-layered defense
Define
SPIM
Spam over Instant Messaging
Define
Spam
- Unsolicited messages, typically over email or on forums, etc.
- Can be malicious, but not necessarily so.
- Includes commercial advertising, non-commercial proselytizing, as well as malicious attacks like phishing
What are the problems caused by spam?
- Security concerns
- resource utilization
- storage costs
- management of spam
How to protect against spam?
- It is necessary to combine multiple approaches.
- Mail gateways / filters
- Utilize Allow lists
- SMTP standards checking (blocking anything not following RFC standards)
- rDNS check
- Tarpitting
- Recipient filtering
Define
Recipient Filtering
Blocking all email not addressed to a valid recipient
Define
rDNS
- Reverse DNS
- Confirms if a sender’s domain matches their IP address
Define
Tarpitting
- Intentionally slowing down server performance to slow down / mitigate an attack
- Ex. slow delivery of e-mail to prevent mass mailed spam, so the spammers move on from you
Define
Tailgating
- use an authorized person to gain unauthorized access to a building
- May involve social engineering such as walking with your hands full, posing as a 3rd party vendor, etc.
How to protect against tailgaiting?
- A no-tailgating policy
- Policy that all visitors must wear badges
- Mechanically prevent more than one person from entering at a time, such as a rotary, vestibule, airlock
What are some principles of social engineering?
- Authority
- Intimidation
- Scarcity
- Urgency
- Consensus / social proof
- Familiarity / Liking
- Trust
Define
Virus
- Malware that can reproduce itself
- Requires human interaction to execute
Define
Worm
A virus that can replicate and jump from machine to machine without requiring any human interaction