2.5 Compare and contrast social engineering attacks, threats, and vulnerabilities
📘CompTIA A+ Core 2 (220-1202)
In IT, a threat is anything that can potentially harm a system, network, or data. Threats can be external (hackers) or internal (employees with bad intentions). Understanding threats is critical for defending networks and systems.
Here are the main threats you need to know:
1. Denial of Service (DoS)
- What it is: An attack that makes a system, network, or service unavailable to users.
- How it works: The attacker floods a server with more requests than it can handle.
- Example in IT: A website’s server gets too many fake requests and crashes, so legitimate users cannot access it.
2. Distributed Denial of Service (DDoS)
- What it is: Like DoS, but the attack comes from multiple computers at the same time.
- How it works: Hackers control many devices (a botnet) to overwhelm a system.
- Example in IT: An online service is flooded by thousands of devices, slowing it down or taking it offline completely.
3. Evil Twin
- What it is: A fake Wi-Fi network set up by an attacker to steal information.
- How it works: Users think they are connecting to a legitimate network but are actually connecting to the attacker’s network.
- Example in IT: Employees connect to a fake office Wi-Fi, and the attacker can intercept their passwords and emails.
4. Zero-day Attack
- What it is: An attack that targets a software vulnerability before the developer knows about it or has patched it.
- How it works: Hackers exploit the flaw immediately.
- Example in IT: A new vulnerability in Windows is used by attackers before Microsoft releases a security update.
5. Spoofing
- What it is: Pretending to be someone or something else to gain unauthorized access.
- How it works: The attacker disguises as a trusted system, IP, or email sender.
- Example in IT: An attacker sends an email that looks like it’s from IT support, asking for credentials.
6. On-path Attack (formerly called Man-in-the-Middle)
- What it is: Intercepting communication between two parties to steal or modify data.
- How it works: The attacker sits in the middle of a network conversation.
- Example in IT: An attacker intercepts unencrypted traffic between a user and a server to steal login credentials.
7. Brute-force Attack
- What it is: Trying every possible password combination until the correct one is found.
- How it works: Automated tools generate passwords repeatedly.
- Example in IT: A tool tries all possible combinations to gain access to a user account.
8. Dictionary Attack
- What it is: Similar to brute-force, but it uses a list of common words instead of random combinations.
- How it works: The attacker tries passwords from a precompiled dictionary of likely words.
- Example in IT: Trying “password123” or “welcome” repeatedly to hack an account.
9. Insider Threat
- What it is: A threat coming from within an organization.
- How it works: Employees or contractors misuse their access, intentionally or accidentally.
- Example in IT: An employee steals sensitive company data or installs malware.
10. Structured Query Language (SQL) Injection
- What it is: Attackers exploit vulnerabilities in databases by inserting malicious SQL code.
- How it works: They manipulate database queries to gain unauthorized access or delete data.
- Example in IT: A login form is poorly secured, and the attacker types a SQL command that logs them in without a password.
11. Cross-Site Scripting (XSS)
- What it is: Attackers inject malicious code into websites that are then executed in users’ browsers.
- How it works: The code can steal cookies, session tokens, or redirect users.
- Example in IT: A comment box on a company website allows malicious scripts that capture visitor login details.
12. Business Email Compromise (BEC)
- What it is: Attackers impersonate a company executive or vendor via email to trick employees into transferring money or sharing sensitive data.
- How it works: Often uses social engineering and spoofed email addresses.
- Example in IT: An employee receives an email that looks like it’s from the CFO asking for a wire transfer to a fake account.
13. Supply Chain / Pipeline Attack
- What it is: Compromising a system or software through a third-party vendor.
- How it works: Hackers insert malicious code in software updates, hardware, or services before it reaches the company.
- Example in IT: Malware is included in a software update from a trusted vendor, infecting all clients who install it.
✅ Key Exam Tips
- Understand the difference between DoS and DDoS: One source vs. multiple sources.
- Focus on the attack vector: How the attacker gains access—network, software, email, or insider.
- Know the IT-specific examples of each threat—they often appear as multiple-choice questions.
- Remember social engineering is human-based, while these threats are mostly technical.
