Cyberattacks, Crime and Defenses

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

A series of flashcards designed to help review and test understanding of key concepts related to cyberattacks, their methodologies, defenses, and case studies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What is the primary function of cookies in web applications?

Cookies hold the 'state' and help retain information about the user, such as their identity and login status.

2
New cards

What does TLS protect against?

Transport Layer Security helps to prevent eavesdropping.

3
New cards

How does XSS differ from phishing?

XSS uses the original website to execute scripts as opposed to directly tricking a user into providing information.

4
New cards

What are the primary prevention methods for SQL Injection?

Signature-based filtering, sanitization of inputs, and truncating input length.

5
New cards

What is a persistent XSS attack?

A persistent XSS attack involves storing malicious scripts on the server, which are then executed whenever a user visits the site.

6
New cards

What are GET and POST requests in terms of data handling?

GET requests pass search parameters in the URL, while POST requests send parameters hidden in the request body.

7
New cards

What is the OWASP cheat sheet used for?

It lists common web application attacks and provides guidance on avoiding security problems.

8
New cards

What is a watering hole attack?

A watering hole attack is a targeted attack where the attacker infects a site that specific users are likely to visit.

9
New cards

What happened during the Stuxnet attack?

Stuxnet was a cyberattack that targeted an Iranian nuclear enrichment facility, using USB sticks to propagate and exploit zero-day vulnerabilities.

10
New cards

What is the main difference between IT networks and ICS networks?

IT networks prioritize confidentiality and are often complex, while ICS networks focus on integrity and availability with fewer hosts.

11
New cards

What is the significance of zero-day exploits?

Zero-day exploits target previously unknown vulnerabilities without available patches, making them highly dangerous.

12
New cards

What is multi-factor authentication (MFA) fatigue?

MFA fatigue occurs when users become overwhelmed by frequent authentication prompts and may inadvertently allow unauthorized access.

13
New cards

What is the primary goal of the Colonial Pipeline attack?

The primary goal was to extort money through ransomware, disrupting the oil supply chain in the US.

14
New cards

What is the acronym SCADA stand for?

Supervisory Control and Data Acquisition.

15
New cards

What is a denial of service (DoS) attack?

A DoS attack aims to make a machine or network resource unavailable by overwhelming it with traffic.

16
New cards

What are some of the challenges regarding attacks on critical infrastructure?

Challenges include outdated technology, lack of security focus during development, and the complexity of interconnected systems.

17
New cards

What drives cybersecurity market motivations?

Compliance with laws and regulations often serves as the main market driver for cybersecurity solutions.

18
New cards

What is an anomaly detection system?

An anomaly detection system monitors for deviations from normal behavior to identify potential threats.

19
New cards

What does the term 'exploit as a service' refer to?

It refers to platforms that provide malicious tools for conducting attacks, often using a pay-per-install or subscription model.

20
New cards

What is the main challenge with the use of AI in attacks?

AI models can easily be manipulated through prompt injection, making it challenging to differentiate legitimate input from malicious commands.

21
New cards

What constitutes the concept of 'social engineering'?

Social engineering involves manipulating people into performing actions that compromise security or provide sensitive information.