2.4 Social Engineering, Threats, and Vulnerabilities SNV

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is a DDoS attack?

"Distributed Denial of Service," and it's a type of cyber attack that aims to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of traffic. The "distributed" aspect refers to the use of multiple compromised computers or devices, often forming a botnet, to generate the traffic and launch the attack. DDoS attacks are designed to make online resources temporarily or indefinitely unavailable to users.

WHat is EOL OSs?

"End of Life," and in the context of operating systems (OSs), it refers to the point in time when the vendor or developer ceases to keep selling the OS version. It may or may not allow for ongoing support (Security patches, maintenance, bug fixes etc.) Typically the first warning of an impending EOSL.

What are the most common types of spoofing?

1. IP 2. Email 3.DNS 4. Caller ID 5. MAC Address 6. Website 7. Bluetooth

What is BYOD?

Bring-your-own-device (BYOD) is a policy that allows employees to bring their own personal mobile devices to work and use those devices to connect to (or through) the company network to business resources and/or the Internet. Although BYOD may improve employee morale and job satisfaction, it increases security risk to the organization.

What does XXS stand for and what is it?

Cross-Site Scripting (XSS) is a type of web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. These scripts can execute in the context of the victim's browser, leading to a range of attacks, such as stealing sensitive information, session hijacking, or defacing websites.

What is DoS?

Denial of Service type of cyber attack that aims to disrupt the normal functioning of a network, service, or website, making it temporarily or indefinitely unavailable to users. The primary goal of a Denial of Service attack is to overwhelm the targeted system with a flood of traffic or resource exhaustion, rendering it incapable of responding to legitimate requests.

What is EOSL?

End of Service Life Not only has the vendor stopped selling the OS version, but it also is no longer going to support or maintain the OS.

What is dumpster diving?

Going through trash and looking for people's personal information

What is another name for On-path attacks?

Man in it the middle attack

What is shoulder surfing?

This is a social engineering attack in which the attackers obtain confidential information by looking over somebody's shoulder to read what's on their computer screen or to observe what they're typing.

What is impersonation?

an attacker who pretends to be someone else

What is SQL injection?

attack that occurs when an attacker inserts malicious SQL (Structured Query Language) code into input fields or query parameters of a web application, with the intention of manipulating the application's database.

What is a dictionary attack?

attacker systematically attempts to gain unauthorized access to a system or account by using a precompiled list (or "dictionary") of potential passwords. Unlike a brute force attack that tries all possible combinations, a dictionary attack relies on trying a list of known words, phrases, or commonly used passwords.

What is a brute force attack?

attacker systematically tries all possible combinations of passwords or encryption keys until the correct one is found. This method is straightforward and relies on the assumption that the correct password is among the exhaustive set of possibilities.

What is phishing?

attackers use deceptive emails, messages, or websites to trick individuals into divulging sensitive information, such as usernames, passwords, or financial details. Phishing often involves impersonating a trusted entity or creating a false sense of urgency to manipulate users into taking actions that benefit the attacker, such as clicking on malicious links or providing confidential information.

What is vishing?

attackers use phone calls or voice communication to deceive individuals into revealing sensitive information or taking certain actions. Vishing often involves impersonating a trustworthy entity, such as a bank, government agency, or technical support, to trick victims into providing personal information, financial details, or access credentials.

What is an unpatched system?

computer systems, software applications, or devices that have not been updated with the latest security patches and updates provided by the software vendors. These updates are released to address known vulnerabilities, bugs, and security issues, and failing to apply them can leave systems exposed to exploitation by malicious actors.

What is social engineering?

form of cyber attack that relies on psychological manipulation to deceive individuals into divulging confidential information, providing access to sensitive systems, or taking specific actions

WHat is an on-path attack?

occurs when an attacker intercepts and potentially alters the communication between two parties without their knowledge.

What is a non-compliant system?

refers to a computer system, software application, network, or IT infrastructure that does not adhere to established standards, regulations, or security policies. * Think, computer turned off for months and then trying to rejoin the corporate network. It has missed out on multiple security patches/updates and is no longer compliant and not able to join network until fixed.

What is an Insider threat?

security risk that originates from individuals within an organization, such as employees, contractors, or business partners, who have access to sensitive information concerning the organization's security practices, data, computer systems, or networks. **can be intentional or unintentional **Someone who has AUTHORIZED access to sensitive info

What is an unprotected system?

system, network, or device that lacks adequate security measures to safeguard against unauthorized access, data breaches, and other potential threats.

What is whaling?

targeted form of phishing attack that specifically focuses on high-profile individuals within an organization, such as executives, top-level managers, or individuals with significant decision-making authority. In a whaling attack, the attacker often poses as a trusted entity, such as a senior executive or a colleague, to trick the targeted individual into taking actions that could be detrimental to the organization.

What is a zero-day attack?

targets a previously unknown and unpatched vulnerability in software, hardware, or firmware. The term "zero-day" signifies that developers have had zero days to address or fix the vulnerability because it is exploited by attackers before the affected vendor releases a patch or fix.

What is spoofing?

the act of falsifying information to deceive or trick individuals, systems, or networks. In the context of cybersecurity, several types of spoofing attacks aim to manipulate the transmission of data to achieve malicious objectives.

What is an "evil twin" attack?

type of wireless network attack where a malicious actor sets up a rogue Wi-Fi access point with a name (SSID) similar or identical to a legitimate, trusted network. The goal is to trick users into connecting to the malicious access point, allowing the attacker to intercept and manipulate their network traffic.

What is tailgating?

unauthorized person following an authorized individual into a secured or restricted area without proper authentication or authorization. This social engineering technique takes advantage of the natural tendency of individuals to be courteous or helpful, allowing the unauthorized person to gain physical access to a building, room, or facility.


Conjuntos de estudio relacionados

Chapter 10- Greek and Roman Theatre

View Set

Massage Principles & Practice Review

View Set

Funds of nursing module 17 geriatric quiz

View Set