Types of Hacker Attacks Flashcards

1
Q

Briefly explain one attack method used by hackers.

A

Malware attacks: Malware is a type of software designed to harm a computer system or network. Malware attacks can include viruses, worms, Trojan horses, and other types of malicious software.

Phishing attacks: Phishing is a type of social engineering attack that involves tricking users into giving up sensitive information, such as passwords or credit card numbers. Phishing attacks can be carried out via email, social media, or other online channels.

Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks: DoS and DDoS attacks are designed to overwhelm a target system or network with traffic, making it inaccessible to legitimate users. These attacks can be carried out using a variety of techniques, including flooding the target with traffic or exploiting vulnerabilities in the target’s software.

SQL injection attacks: SQL injection is a type of attack that involves exploiting vulnerabilities in a web application’s database to access sensitive data or execute unauthorized commands. This type of attack is often carried out by injecting malicious SQL code into a web form or other input field.

Cross-site scripting (XSS) attacks: XSS attacks are a type of attack that involves injecting malicious code into a website to steal sensitive information or execute unauthorized commands. This type of attack is often carried out by exploiting vulnerabilities in a web application’s code.

Man-in-the-middle (MitM) attacks: MitM attacks involve intercepting communication between two parties to steal sensitive information or execute unauthorized commands. This type of attack can be carried out by exploiting vulnerabilities in the target’s software or by tricking users into connecting to a fake network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List down all categories of hackers.

A

White hat hackers or ethical hackers, Black hat hackers or malicious hackers, Grey hat hackers, Red team hackers, Blue hat hackers, Green hat hackers, Script kiddies, State-sponsored hackers and Hacktivists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Demonstrate the use of doxing as a security threat by hackers.

A

This involves researching and publishing private or sensitive information about an individual or organization. Hackers may use social engineering techniques or exploit vulnerabilities in systems to gain access to this information.
Example: A hacker gains access to a company’s database and publishes the personal information of its employees online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compare between the following two new security threats used by hackers: cryptojacking and IoT attacks.

A

Internet of Things (IoT) attacks: These involve exploiting vulnerabilities in connected devices, such as smart home appliances or industrial control systems, to gain access to a victim’s network.
Example: A hacker gains access to a smart thermostat in a home network and uses it to launch a distributed denial of service (DDoS) attack on a website.

Cryptojacking: This involves using a victim’s computing resources to mine cryptocurrency without their knowledge or consent. Hackers may use malware or exploit vulnerabilities in web browsers or cloud infrastructure to carry out cryptojacking.
Example: A website runs a script that uses visitors’ CPU power to mine cryptocurrency without their consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analyse the various countermeasures for hacker attacks that bypass authentication.

A

Strong and unique passwords: Encourage users to create strong, unique passwords that are difficult to guess and are not used on any other accounts.

Multi-factor authentication (MFA): Implement MFA, which requires users to provide two or more forms of authentication, such as a password and a fingerprint, to gain access to an account.

Account lockout policies: Implement policies that lock accounts after a certain number of failed login attempts to prevent brute force attacks.

Password complexity policies: Enforce password complexity policies that require users to create passwords with a minimum length and a mix of upper and lower case letters, numbers, and special characters.

Security awareness training: Educate users on the risks of social engineering attacks and how to identify and avoid them.

Regular password changes: Encourage users to regularly change their passwords to reduce the risk of password reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With regard to target and impact, differentiate between attacks by nation-sponsored hackers and black hat hackers.

A

Nation-sponsored hackers, as the name suggests, are hackers who are sponsored and funded by nation-states. Their primary goal is to gain access to sensitive government or corporate data, and their attacks are often motivated by political or economic reasons. These hackers are typically highly skilled and well-funded, and they often use sophisticated tools and techniques to gain access to their targets.

The impact of nation-sponsored attacks can be severe, as they can result in the theft of classified or sensitive data, the disruption of critical infrastructure, or even physical damage to facilities. Nation-sponsored attacks are often part of larger geopolitical conflicts and can have far-reaching consequences beyond the immediate target.

On the other hand, black hat hackers are individuals who hack for personal gain or malicious reasons. They target a wide range of organizations and individuals, including government agencies, businesses, and individuals. Their goal may be to steal personal information, financial data, or to cause disruption to a system or network.

The impact of black hat attacks can vary depending on the target, but it can include financial losses, reputational damage, or the theft of personal or sensitive information. Black hat attacks are often motivated by financial gain or a desire to cause harm or disruption, and the attackers are typically less skilled and less well-funded than nation-sponsored hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Assess how new AI-based technologies be misused by hackers today.

A

AI-based technologies have become increasingly popular in recent years, and while they offer many benefits, they can also be misused by hackers. Here are a few ways AI-based technologies can be misused:

Automated attacks: Hackers can use AI algorithms to automate attacks, making them faster and more efficient. For example, they can use AI to create sophisticated phishing emails that are more likely to fool people into giving away sensitive information.

Data theft: AI can be used to analyze large datasets and identify patterns that can be used to steal sensitive information. For example, hackers can use AI to analyze social media data to learn more about their targets and find vulnerabilities in their systems.

Malware: Hackers can use AI to create more sophisticated malware that can evade detection by traditional security systems. They can use AI to analyze the behavior of security systems and develop malware that can avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly