1/20
A series of flashcards designed to help review and test understanding of key concepts related to cyberattacks, their methodologies, defenses, and case studies.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the primary function of cookies in web applications?
Cookies hold the 'state' and help retain information about the user, such as their identity and login status.
What does TLS protect against?
Transport Layer Security helps to prevent eavesdropping.
How does XSS differ from phishing?
XSS uses the original website to execute scripts as opposed to directly tricking a user into providing information.
What are the primary prevention methods for SQL Injection?
Signature-based filtering, sanitization of inputs, and truncating input length.
What is a persistent XSS attack?
A persistent XSS attack involves storing malicious scripts on the server, which are then executed whenever a user visits the site.
What are GET and POST requests in terms of data handling?
GET requests pass search parameters in the URL, while POST requests send parameters hidden in the request body.
What is the OWASP cheat sheet used for?
It lists common web application attacks and provides guidance on avoiding security problems.
What is a watering hole attack?
A watering hole attack is a targeted attack where the attacker infects a site that specific users are likely to visit.
What happened during the Stuxnet attack?
Stuxnet was a cyberattack that targeted an Iranian nuclear enrichment facility, using USB sticks to propagate and exploit zero-day vulnerabilities.
What is the main difference between IT networks and ICS networks?
IT networks prioritize confidentiality and are often complex, while ICS networks focus on integrity and availability with fewer hosts.
What is the significance of zero-day exploits?
Zero-day exploits target previously unknown vulnerabilities without available patches, making them highly dangerous.
What is multi-factor authentication (MFA) fatigue?
MFA fatigue occurs when users become overwhelmed by frequent authentication prompts and may inadvertently allow unauthorized access.
What is the primary goal of the Colonial Pipeline attack?
The primary goal was to extort money through ransomware, disrupting the oil supply chain in the US.
What is the acronym SCADA stand for?
Supervisory Control and Data Acquisition.
What is a denial of service (DoS) attack?
A DoS attack aims to make a machine or network resource unavailable by overwhelming it with traffic.
What are some of the challenges regarding attacks on critical infrastructure?
Challenges include outdated technology, lack of security focus during development, and the complexity of interconnected systems.
What drives cybersecurity market motivations?
Compliance with laws and regulations often serves as the main market driver for cybersecurity solutions.
What is an anomaly detection system?
An anomaly detection system monitors for deviations from normal behavior to identify potential threats.
What does the term 'exploit as a service' refer to?
It refers to platforms that provide malicious tools for conducting attacks, often using a pay-per-install or subscription model.
What is the main challenge with the use of AI in attacks?
AI models can easily be manipulated through prompt injection, making it challenging to differentiate legitimate input from malicious commands.
What constitutes the concept of 'social engineering'?
Social engineering involves manipulating people into performing actions that compromise security or provide sensitive information.