1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Threat vector / attack vector
whichever method is used by the attacker
What is one example of an image-based vector?
Scalable Vector graphic (SVG) format
Scalable Vector Graphic
a XML file that allows you to embed other info within the XML
What are some file based vectors
executables, Adobe PDF (a file that holds information in it), ZIP/RAR files (compression types), microsoft office (macros on docs)
Spam over IP (voice vector)
use of voice over IP systems to send many spam messages
War Dialing
use of unpublished phone numbers that gains attackers access to systems
Call tampering
Disrupting your systems through a DOS attack by using your messaging systems as a threat vector
What is a way for a attacker to get around a firewall?
Using a USB ( a removable device vector)
Supply chain vector
a third party gains access to your infrastructure by writing inside of existing equipment that you’re installing