Podcast
Questions and Answers
What type of person might have restricted access to grounds, network, or system?
What type of person might have restricted access to grounds, network, or system?
What is the primary goal of dumpster diving?
What is the primary goal of dumpster diving?
What is the main purpose of shoulder surfing?
What is the main purpose of shoulder surfing?
What is the main difference between phishing attacks and baiting?
What is the main difference between phishing attacks and baiting?
Signup and view all the answers
How often should users receive social engineering attack training?
How often should users receive social engineering attack training?
Signup and view all the answers
Why should users avoid opening emails in the spam folder?
Why should users avoid opening emails in the spam folder?
Signup and view all the answers
What is the goal of malicious emails with password-protected archives?
What is the goal of malicious emails with password-protected archives?
Signup and view all the answers
What is the weakest link in social engineering attacks?
What is the weakest link in social engineering attacks?
Signup and view all the answers
What is the purpose of training users about social engineering attacks?
What is the purpose of training users about social engineering attacks?
Signup and view all the answers
What is the goal of baiters who offer free music or movie downloads?
What is the goal of baiters who offer free music or movie downloads?
Signup and view all the answers
Study Notes
Privilege Escalation
- Begins by stealing one user's account, then attempting to gain elevated access to other resources
- Can use transitive attacks to gain additional access, exploiting permissions on one system to access another
- Insider threats, such as members of an organization's staff, can also use privilege escalation attacks
Zero-Day Attacks
- Occur before a vulnerability is announced or fixed
- No patch is available for a zero-day exploit when it occurs
- Can quickly compromise hundreds or thousands of systems
- Examples of zero-day libraries include the Zero-Day Vulnerability Database (zero-day.cz)
Identifying Types of Cyber Attacks
- Types of cyber attacks include:
- Client-side Attacks
- Web Attacks
- Network Attacks
- Wireless Attacks
- Social Engineering Attacks
Web Attacks
- Common attacks include:
- Cross-Site Scripting (XSS)
- SQL Injection
- XSS exploits web application vulnerabilities, injecting scripts into webpages served to visitors
- SQL Injection is a common attack against web applications, injecting Structured Query Language (SQL) instructions into an application's input
Network Attacks
- Attacks that occur on the network during transmission of data
- Types of attacks include:
- Spoofing
- Packet Sniffing
- Man-in-the-middle (MITM)
- Denial of Service Attacks
Spoofing
- Providing false information on a network, such as email spoofing
- Can be used to gain restricted access to a system or network
Social Engineering
- Includes attacks such as:
- Dumpster Diving (looking for sensitive information in trash)
- Shoulder Surfing (watching someone enter sensitive data)
- Baiting (offering free items or goods in exchange for login credentials)
Dealing with Social Engineering Attacks
- Do not open emails from unknown sources or attachments from unknown origin
- Train humans to be aware of the latest attacks through bi-annual training sessions
- Recognize and avoid malicious emails with password-protected archives
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about privilege escalation attacks, where an attacker gains elevated access to resources by exploiting existing privileges. This includes transitive attacks, where access to one system is used to gain access to another trusted system.