Common threat vectors (2.2)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Threat vector / attack vector

whichever method is used by the attacker

2
New cards

What is one example of an image-based vector?

Scalable Vector graphic (SVG) format

3
New cards

Scalable Vector Graphic

a XML file that allows you to embed other info within the XML

4
New cards

What are some file based vectors

executables, Adobe PDF (a file that holds information in it), ZIP/RAR files (compression types), microsoft office (macros on docs)

5
New cards

Spam over IP (voice vector)

use of voice over IP systems to send many spam messages

6
New cards

War Dialing

use of unpublished phone numbers that gains attackers access to systems

7
New cards

Call tampering

Disrupting your systems through a DOS attack by using your messaging systems as a threat vector

8
New cards

What is a way for a attacker to get around a firewall?

Using a USB ( a removable device vector)

9
New cards

Supply chain vector

a third party gains access to your infrastructure by writing inside of existing equipment that you’re installing