Threats, Vulnerabilities And Mitigation (Chapter 2) Flashcards
(63 cards)
Advanced Persistent Threats
Is a sophisticated, well funded group that uses multiple attack vectors to gain access to a network and remain undetected for as long as possible with the end goal of steal data/assets
Shadow IT
The use of unauthorized or unapproved IT resources within an organisation, that can unintentionally introduce vulnerabilities
Threat Vector
Is the path in which a cyber criminal uses to attack a vulnerability
Attack surface
The total number of all possible entry point (threat Vector) for unauthorized access into the network
Social engineering
Is the psychological manipulation of people into divulging confidential information or performing actions they shouldn’t do
Phishing
Sending fake emails to a large group of people with the intention of one of the recipients opening a malicious attachment or opening a malicious link
Spear phishing
Is a phishing attack that is targeted to a specific group
Whaling
A phishing attack that is targeting to a high value individual such as a CEO
Vishing
A phishing attack that uses pre-recorded voice messages to pressure a user
Tailgating
Is when an authorised individual follows someone into an area they are not authorised to be in without the consent of the authorised individual
Piggybacking
Is when an unauthorized individual follows someone into an area with the consent of the authorised person
Email account compromised
An attacker sends a email messages that appears to come from a known source and making a legitimate request, but instead hold malicious links/attachments
Smishing
Is a phishing attack that uses SMS or social media
Water-holing
An attack that entices users with a common interest to visit a malicious website
Pharming
Redirects a user to a bogus website that mimics the appearance of a legitimate one
Misinformation/disinformation
The spread of false information to deceive people used for political, military or commercial goals
Typosquatting
Is a fake domain name that is very similar to a legitimate websites domain name, the fake domain will direct the user to a malicious site
Baiting
An online attack that promises the victim a reward
Shoulder surfing
An unauthorized person spies over the user shoulder to see what they are typing
Dumpster diving
Going through someone’s trash
Password Cracking
A local it remote password cracking attack that uses dictionary/brute force/rainbow table or pass the hash to gain access to a users account
-it targets security misconfiguration for authentication
Remote Code Execution
Any conditions in which an attacker can execute arbitrary code across a network
- generally made possible due to lack of input validation/sanitisation or bounds checking
Buffer/ heap overflow
A programming error which allows attackers to overwrite allocated memory addresses with malicious code
- made possible via lack of bounds checking, the memory that is allocated for the user input is overloaded resulting in memory “leaking” into other addresses where malicious code can be injected and executed
Memory Corruption
A programming error that allows attackers to access a programs memory space and hijack the normal execution flow.
- made possible by programming errors