Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
SY0 701
> 2.4 On Path Attacks > Flashcards
2.4 On Path Attacks Flashcards
(2 cards)
Study These Flashcards
1
Q
On-path network attack
A
How can an attacker watch without you knowing?– Formerly known as man-in-the-middle
Redirects your traffic– Then passes it on to the destination– You never know your traffic was redirected
ARP poisoning– On-path attack on the local IP subnet– ARP has no security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
On-path browser attack
A
What if the middleman was on the same computer
as the victim?– Malware/Trojan does all of the proxy work– Formerly known as man-in-the-browser
Huge advantages for the attackers– Relatively easy to proxy encrypted traffic– Everything looks normal to the victim
The malware in your browser waits for you to
login to your bank– And cleans you out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
SY0 701
flashcards
Decks in class (131)
# Cards
Security controls 1.1
11
Preventive Control types (1.1)
4
Deterrent control types (1.1
4
Detective control types (1.1)
4
Corrective control (1.1)
4
Compensating control (1.1)
4
Directive control type (1.1)
4
CIA Triad 1.2
4
Confidentiality (1.2)
4
Integrity (1.2)
5
Availability (1.2)
4
Non repudiation (1.2)
5
Acronyms
324
Authentication, Authorization, & Accounting 1.2
7
Gap Analysis 1.2
5
Zero Trust 1.2
8
Physical Security 1.2
7
1.2 Deception & Disruption
4
Change management steps 1.3
9
Technical change management steps 1.3
9
Public Key Infrastructure 1.4
6
Encrypting data 1.4
10
Key Exchange 1.4
6
Encryption technologies 1.4
7
Obfuscation 1.4
7
Hashing & digital signatures 1.4
9
Blockchain technology 1.4
2
Certificates 1.4
12
2.1 Threat Actors
15
2.2 Common Threat Vectors
13
2.2 Phishing
4
Impersonation 2.2
6
Watering Hole Attacks 2.2
4
Other Social engineering attacks (2.2)
3
Memory Injections 2.3
3
Buffer Overflows 2.3
1
Race Conditions 2.3
3
Malicious Updates 2.3
3
2.3 Operating system vulnerabilities
3
2.3 SQL Injection
4
2.3 Cross Site Scripting
7
2.3 Hardware Vulnerabilities
4
2.3 Virtualization Vulnerabilities
4
2.3 Cloud specific Vulnerabilities.
3
Supply chain vulnerabilities 2.3
7
Misconfiguration vulnerabilities 2.3
5
Mobile device vulnerabilities 2.3
4
Zero-day vulnerabilities 2.3
3
An overview of Malware 2.4
6
2.4 Viruses and worms
5
2.4 Spyware and Bloatware
5
2.4 Other Malware Types
6
2.4 Physical attacks
4
2.4 Denial of Service
4
2.4 DNS attacks
4
2.4 Wireless Attacks
5
2.4 On Path Attacks
2
2.4 Replay attacks
6
2.4 Malicious Code
3
2.4 Application attacks
11
2.4 Cryptographic Attacks
5
2.4 Password attacks
6
2.4 Indicators of compromise
9
2.5 Segmentation and Access Control
3
2.5 Mitigation techniques
6
2.5 Hardening techniques
9
3.1 Cloud Infrastructure
6
3.1 Network Infrastructure concepts
4
3.1 other Infrastructure concepts
10
3.1 Infrastructure Considerations
12
3.2 Secure Infrastructures
5
3.2 Intrusion prevention
5
3.2 Network appliances
10
3.2 Port Security
4
3.2 Firewall Types
6
3.2 Secure communication
11
3.3 Data types and classifications
3
3.3 States of Data
5
3.3 Protecting data
9
3.4 Resiliency
11
3.4 Capacity planning
4
3.4 Recovery Testing
5
3.4 Backups
8
3.4 Power resiliency
3
4.1 Secure Baselines
4
4.1 Hardening targets
10
4.1 Securing wireless & Mobile
8
4.1 Wireless Security settings
11
4.1 Application Security
7
4.2 Asset management
6
4.3 Vulnerability scanning
5
4.3 Threat intelligence
5
4.3 Penetration testing
5
4.3 Analyzing Vulnerabilities
9
4.3 Vulnerability remediation
9
4.4 Security monitoring
8
4.4 Security tools
11
4.5 Firewalls
6
4.5 Web filtering
8
4.5 Operating system security
3
4.5 Secure Protocols
5
4.5 email security
5
4.5 Monitoring data
7
4.5 Endpoint Security
8
4.6 Identity and Access Management
10
4.6 Access controls
8
4.6 Multifactor Authentication
7
4.6 Password Security
7
4.7 Scripting and automation
4
4.8 Incident response
10
4.8 Incident planning
5
4.8 Digital Forensics
7
4.9 Log data
12
5.1 Security policies
10
5.1 Security Standards
5
5.1 Security procedures
7
5.1 Security considerations
4
5.1 Data roles & Responsibilities
2
5.2 Risk Management
4
5.2 Risk Analysis
6
5.2 Risk Management Strategies
2
5.2 Business impact analysis
1
5.3 Third Party Assessment
10
5.3 Agreement types
2
5.4 Compliance
7
5.4 privacy
6
5.5 Audits and Assessments
3
5.5 Penetration tests
6
5.6 Security Awareness
5
5.6 User training
2
1.1 Compare and contrast types of secuirty controls
1