INFASEC2

Cards (26)

  • ARP Poisoning
    Manipulates network packets to intercept or modify data between devices
  • Attack Mechanism
    Exploits website vulnerabilities to deliver malicious JavaScript to unsuspecting users
  • Attack Techniques
    Various methods used to guess or decrypt passwords
  • Botnets
    Networks of hacked machines controlled remotely by attackers, used to generate and launch DDoS attacks
  • Cross-Site Scripting (XSS)

    Executes malicious code in a user's browser through vulnerable websites
  • DDoS Attacks
    Overloads online services with massive traffic, rendering them inaccessible
  • DNS Poisoning
    Manipulates DNS servers to redirect users to fraudulent websites
  • Exploit Database
    A repository of exploits related to vulnerabilities
  • Exploitation
    Uses programmed software or scripts to exploit system vulnerabilities, gaining control
  • MITM
    Intercepts and alters communication between parties without their knowledge
  • Password Hacking
    Involves gaining unauthorized access to accounts or systems by guessing or decrypting passwords
  • Penetration Testing
    Identifies and mitigates security vulnerabilities through simulated cyber attacks
  • Social Engineering
    Manipulates individuals to compromise security
  • SQL Injection
    Manipulates databases through input fields in web applications
  • Vulnerability Exploitation
    Occurs when web applications fail to properly validate inputs before passing them to SQL statements
  • Vulnerability Scanners
    Tools used to scan for vulnerabilities in systems
  • Wireless Hacking
    Wireless networks connect devices via radio waves, offering flexibility but vulnerable to security threats
  • Wireless Network Components
    Various components involved in wireless networks
  • Common Vulnerabilities and Exposures (CVE)

    Standard for information security vulnerability names, providing a dictionary of publicly known vulnerabilities and exposures
  • National Vulnerability Database (NVD)

    U.S. government repository of standards-based vulnerability management data, facilitating automation of vulnerability management and compliance
  • Remote Exploits
    Used to gain access to remote systems or networks
  • Local Exploits
    Used by system users to bypass their rights on local systems
  • Attributes of a Strong Password
    • Contains at least 8 characters
    • Includes a mix of letters, numbers, and special characters
    • Utilizes a combination of lowercase and uppercase letters
  • Dictionary Attack
    Uses a predefined list of words to guess passwords, exploiting weak or easily guessable passwords
  • Hybrid Dictionary Attack
    Combines dictionary words with extensions (e.g., adding numbers) to generate potential passwords
  • Brute-Force Attack
    Tries all possible combinations of characters to crack a password, requiring substantial processing power and time