Page 32 - CITP Review
P. 32

  Passports
              Stolen account credentials
              Social Security numbers
              Driver’s licenses
              Loyalty accounts
              Medical records


            Types of attacks
            The following are common types of cyberattacks used by cyber adversaries to disrupt the confidentiality,
            integrity and availability of information possessed by organizations:

              Classic buffer overflow. A buffer is a sequential section of memory dedicated for specific content,
               such as a single character or a string of characters or numbers. A buffer overflow occurs when a
               program tries to place more data in a buffer than that buffer can hold or when a program attempts to
               put data in a memory area past a buffer. Writing data past or outside the limits of a buffer can cause
               program crashes and data corruption and could even trigger malicious code. Attackers use buffer
               overflows to corrupt the execution stack of a web application by sending customized input to an
               application, causing that application to execute arbitrary code, thereby gaining control over the
                        17
               machine.
              SQL injection. In an SQL injection attack, an SQL query or command is inserted (“injected”) in an
               application through a client’s input data, generally to execute predefined SQL commands. SQL
               injections can allow access to or reading of sensitive data and data modification; they can also give
                                                                    18
               unauthorized users administrative access to a system.
              Cross-Site Scripting (XSS). Cross-Site Scripting (XSS) attacks are another type of injection attack.
               With XSS, an attacker uses an application to send malicious code to another end user. An attacker
               can use XSS to send a malicious script to an unsuspecting user. Because the script appears to come
               from a trusted source, that user’s browser assumes the script can be trusted and will execute it. The
               malicious script can then access any information retained by the browser, such as cookies, and use
                                                                             19
               it. These scripts can even rewrite the content of the HTML page.
              Cross-Site Request Forgery (CSRF). Cross-Site Request Forgery (CSRF) is an attack that tricks an end
               user into performing unwanted actions on a web application in which they're currently logged in.
               These attacks leverage social engineering, such a forged link in an email or chat that purports to
               access a given site but actually accesses a different one. CSRF attacks are generally not for the
               purpose of obtaining data but aim to trick users into executing specified actions. For example, a
               CSRF attack could force a user to change a password or transfer funds. In some cases, CSRF attacks
                                                                 20
               can actually compromise an entire web application.
              Clickjacking. Clickjacking, also known as a UI redress attack, is when an attacker uses multiple
               transparent or opaque layers to trick a user into clicking on a button or link on another page when
               they were intending to click on the top level page. The attacker is effectively "hijacking" clicks meant
                                                              21
               for their page and sending them to another page.
              Denial of service. A denial-of-service (DoS) attack occurs when legitimate users are unable to access
               information systems, devices, or other network resources due to the actions of a malicious cyber


            17  See www.owasp.org/index.php/Buffer_Overflow, accessed June 20, 2019.
            18
              See www.owasp.org/index.php/SQL_Injection, accessed June 20, 2019.
            19
              See www.owasp.org/index.php/Cross-site_Scripting_(XSS), accessed June 20, 2019.
            20
              See www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF), accessed June 20, 2019.
            21  See www.owasp.org/index.php/Clickjacking, accessed June 20, 2019.

            © 2019 Association of International Certified Professional Accountants. All rights reserved.    1-24
   27   28   29   30   31   32   33   34   35   36   37