FLASH CARDS

7.01 Explain common social-engineering attacks, threats, and vulnerabilities

  • What are the three key properties of Information Security, also known as the CIA Triad?

  • (a) Confidentiality: Only authorized people should know specific information. (b) Integrity: Data must be stored and transferred exactly as intended. (c) Availability: Information must be accessible to those authorized to view or modify it.

  • How does cybersecurity differ from information security?

  • Cybersecurity focuses specifically on protecting computer systems and data from attacks, while information security applies to protecting data in any form (electronic or printed).

  • What is hardening in the context of security systems?

  • Hardening refers to improving the security of a system by creating policies and controls that reduce vulnerabilities.

  • What is a vulnerability in security terms?

  • A vulnerability is a weakness or flaw in a system that can be exploited by a threat actor.

  • What is a threat actor?

  • A threat actor is someone or something that has the potential to exploit a vulnerability, either intentionally or unintentionally.

  • What is risk in the context of security assessments?

  • Risk is the likelihood and impact of a threat actor successfully exploiting a vulnerability.

  • What are some common causes of vulnerabilities?

  • (a) Incorrectly configured hardware or software. (b) Delays in applying patches. (c) Misuse of protocols. (d) Poorly designed network architecture. (e) Weak physical security. (f) Insecure password practices.

  • What is a non-compliant system?

  • A non-compliant system is one that no longer follows its baseline security configuration, potentially increasing its attack surface.

  • What is a zero-day vulnerability?

  • A zero-day vulnerability is a flaw that is exploited before the developer is aware of it or before a patch can be released, making it especially dangerous.

  • What is Bring Your Own Device (BYOD), and how does it create vulnerabilities?

  • BYOD allows employees to use personal devices for work, increasing the network’s attack surface and making it harder to ensure security compliance.

  • What is social engineering?

  • Social engineering refers to techniques that trick or intimidate people into revealing confidential information or granting unauthorized access to systems.

  • What is impersonation in social engineering?

  • Impersonation is when an attacker pretends to be someone else, such as IT support, to gain a person’s trust and access sensitive information.

  • What is dumpster diving in social engineering?

  • Dumpster diving involves searching through an organization’s trash for sensitive information that could be used in future attacks.

  • What is shoulder surfing?

  • Shoulder surfing is when an attacker watches someone type their password or PIN, either directly or through tools like binoculars or CCTV.

  • What is tailgating in social engineering?

  • Tailgating is when an attacker gains access to a secure area by following closely behind someone who has proper access.

  • What is phishing?

  • Phishing is a social engineering technique where attackers send fake electronic communications to trick victims into revealing sensitive information or taking harmful actions.

  • What is spear phishing?

  • Spear phishing is a targeted phishing attack where the attacker has specific information about the victim to make the attack more convincing.

  • What is vishing?

  • Vishing is phishing conducted over a voice channel (phone or VoIP), often used to impersonate a bank or other trusted entity.

  • What is an evil twin attack?

  • An evil twin attack is when an attacker sets up a rogue wireless access point to steal users’ credentials by mimicking a legitimate network.

  • What is footprinting?

  • Footprinting is when an attacker gathers information about a network or system to identify vulnerabilities that could be exploited.

  • What is spoofing?

  • Spoofing is when an attacker pretends to be a trusted user or system by faking information such as a MAC or IP address, or using a fake digital certificate.

  • What is an on-path (man-in-the-middle) attack?

  • An on-path attack is when an attacker intercepts and possibly modifies communication between two parties without their knowledge.

  • What is a denial of service (DoS) attack?

  • A DoS attack is when an attacker overloads a system with fake requests, making it unavailable to legitimate users.

  • What is a distributed denial of service (DDoS) attack?

  • A DDoS attack is a type of DoS attack that uses a botnet—a network of compromised devices—to flood a target with requests.

  • How are passwords commonly captured by attackers?

  • Attackers capture passwords by obtaining password files, sniffing unencrypted network traffic, or using password cracking techniques.

  • What is a cryptographic hash?

  • A cryptographic hash is a fixed-length string generated from data using a one-way function, making it impossible to recover the original data from the hash.

  • What is a brute force attack?

  • A brute force attack is when a password cracking tool tries every possible combination of characters until it finds a match.

  • What is a cross-site scripting (XSS) attack?

  • An XSS attack is when an attacker injects malicious scripts into a trusted website, causing the browser to run the script.

  • What is a nonpersistent XSS attack?

  • A nonpersistent XSS attack is when malicious code is temporarily injected into a website, affecting only the user's session.

  • What is a stored/persistent XSS attack?

  • A persistent XSS attack stores malicious code in a website’s back-end system, affecting all users who view the compromised content.

  • What is SQL injection?

  • SQL injection is when an attacker inserts malicious SQL code into a web application’s input fields, tricking it into executing unauthorized database commands.