Host-based security
protecting individual devices found within a network.
Network-Based Security
Protecting all devices connected to the network.
Physical security
Locks on doors, security officers, all about defending the physical machines on the network.
Man-in-the-Middle (on-path) Attack
Someone between you the sender and your intended receiver. Emails, wireless etc.
Prevent - Man-in-the-Middle (on-path) Attack
Encrypt data being sent outside the network. That way even if the man-in-the-middle captures your sent data it can’t be read due to encyrption.
Spoofing
To take on the look and feel of some other legitimate entity. Fakes emails, websites, etc.
Prevent - Spoofing
Creating connections that verify that who you are talking to is who they say they are. Certificates.
Denial of Service (DoS)
bad person creates bad requests, malformed http requests, that cause ta server to stop and look at their bad request. This causes the server to be unable to take the legitimate request and website will error out. Biggest problem on internet today
Distributed Denial of Service (DDoS)
Bad person installs some kind of malware on 10, 100, 1,000, or 10,000s computers. These infected PCs are called zombies. Then bad guys server sends command to zombies to send malformed requests to something to take it down.
Zero day
When a new type of threat that no one has seen before starts breaking things.
Signs you have been hacked
Renamed system files, Normal functions such as clicking on desktop doesn’t work, Files randomly disappearing, and file permissions changing.
Evil Twin Attack
a hacker makes a clone of your WAP using your legitimate information. After they make their own WAP they kick all users off of your WAP. User reconnect to the hackers WAP and they can connect to the internet and everything seems fine, but data is now flowing through the hackers WAP and is being capture by the hacker.
Insider Threat
employee, contractor, or other person who has access to company resources starts stealing, modifying, or removing data.
SQL Injection Attacker
Attacker inserts malicious SQL statements into a webpages input fields. such as a text box on a form. The goal, to access website database and steal PPI (Protected Personal Information)
SQL Injection Attacker - In-Band
injecting SQL code right through input box
SQL Injection Attacker - Error based
Create intentional errors to learn about the website’s database
SQL Injection Attacker - Blind
Using yes/no boolean test to figure out details on website’s database
SQL Injection Attacker - out-of-band
force databse to send data out via DNS or HTTP
SQL Injection Attacker - Time-Based Blind
Adding SQL that creates a delay to test the servers responses.
Cross-Site Scripting (XXS) attack
inserts malicious script into webpages code that changes what users see in the browser.
XXS attack - Stored or Persistent
Attacker saves malicious script so that anyone who views the page sees an altered version
XXS attack - Reflected or non-persistent
most common. The user unknowingly sends malicious script input. Often through phising email, link, or social media.
XXS attack - DoM Based
Document Object Module (DoM) - Manipulates users DOM. Attackers code runs in browser and changes a websites functionality directly.
BEC
Business Email Compromise - Phishing email scam. attacker pretends to be someone the victim knows or trusts. Asks for confidential information.