types of attacks Flashcards
(90 cards)
Social Engineering
Social engineering involves a hacker attempting to trick an employee into compromising security through social contract such as an email.
Impersonation
A social engineering attack in which a hacker attempts to impersonate another employee in the organisation. For example, when a hacker impersonates a network administrator.
Phishing
A social engineering attack in which a hacker typically sends e-meails to users pretending to be a representative form legitimate companies (Banks, Amazon). The email includes falsified information in an attempt to lure the user to click a link redirecting them to a false website in order to obtain/steal personal information
Whaling and Vishing
Two types of phishing attacks. Whaling is a targeted phishing attack aimed at executive level employees. Vishing utilises phone calls as opposed to e-mails.
Smishing
A type of phishing attack which the hacker sends text messages to victims, often impersonating official companies to steal sensitive information
spIM
‘Spam over instant messaging’ is a type of social engineering attack in which bots are utilised to send users instant messages in an attempt to steal user data
Spear Fishing
A type of phishing attack in which an email sent is spoofed and looks like it comes form a trusted source such as a fellow employee.
SPAM
A type of social engineering attack in which unsolicited emails are sent to a number of people.
Eliciting information
A social engineering technique to obtain information from a user that could be used in a future attack.
Prepending
A social engineering technique in which information is added to the beginning of malicious data. For the attacker may get you
to click a link that is www.banksite.com@192.168.2.1, where the
browser would ignore everything to the left of the @ sign.
Invoice Scams
is a type of social engineering attack in which an attacker sends out an email message notifying the victim that payment is overdue and immediate payment is required.
Credential Harvesting
A type of social engineering attack in which hacker collects logon information and then uses that information later to access accounts
Influence campaigns
Social engineering attack which utilises social media to create fake accounts as well as fake posts that are designed to sway opinion
Shoulder Surfing
A type of social engineering attack in which a hacker tries to view confidential information that will assist in compromising security by looking over the shoulder of victims to see computer screens
Tailgating
A type of social engineering attack in which a hacker walks through a secure area by closely following an authorised person who has unlocked the door using their swipe card or passcode. (someone tries to slip through doors behind you after you unlock it)
Physical Attacks
Involve getting physical access to a system or device and gaining access to the device or performing malicious actions against it
Malicious USB cable
A type of physical attack that utilises a malicious cable to connect to the system that can then receive commands form the hacker wirelessly
Malicious flash drive
A physical attack which uses a malicious USB drive that contains malware that executes on the victim system once the flash drive is connected to the USB port of the system
Card cloning
A physical attack that a hacker copies the card information of a magnetic strip
Skimming
A physical attack in which a hacker extracts information from the magnetic strip on the card when you swipe you card
Principles of Social Engineering
Authority, Intimidation, Consensus, Scarcity, Urgency, Familiarity, Trust
DoS
Denial of Service is a network attack that involves a hacker overloading a system with requests so much that it is too busy and cannot service legitimate requests from other clients.
DDoS
Distributed Denial of Service is a network attack that uses a number of systems to perform a larger scale DoS attack. With a DDoS attack, the hacker first compromises
and takes control of a number of systems and then uses those systems to
help with the attack. The compromised systems are known as zombie
systems because they have no mind of their own and will do whatever the
hacker tells them to do.
Different Types of DDoS attacks
Network:
involves using up network
bandwidth or consuming the processing power of network devices so that the network becomes unresponsive or performs poorly
Application:
involves flooding a specific software application or service with requests to cause it to crash or become unresponsive
Operational technology:
DDoS attack against hardware or software that is required to run
industrial equipment