ExamGecko
Question list
Search
Search

Question 72 - ICS-SCADA Cyber Security discussion

Report
Export

What form of attack uses a vector that infects a software package?

A.
Spam
Answers
A.
Spam
B.
All of these
Answers
B.
All of these
C.
Quicksand
Answers
C.
Quicksand
D.
Watering Hole
Answers
D.
Watering Hole
Suggested answer: D

Explanation:

A 'watering hole' attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.

The goal is to infect a website that members of a targeted community frequently use with malware. Once a user visits the compromised website, malware can be delivered to the user's system, exploiting vulnerabilities on their device.

This attack vector is used in scenarios where attackers want to breach secure environments indirectly by targeting less secure points in a network's ecosystem, such as third-party software used within the organization.

Reference

'Watering Hole Attacks: Detect, Disrupt, and Prevent,' by Kaspersky Lab.

'Emerging Threats in Cybersecurity: Understanding Watering Hole Attacks,' published in the Journal of Network Security.

asked 18/09/2024
Rafal Piasecki
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first