Your company decides to implement remote conferencing and wireless screencasting in all the meeting rooms for efficiency and convenience. The wireless display transmitter and receiver, as a pair, work in the ad-hoc mode. Connections to Ethernet ports shall be authenticated through 802.1X. As a security professional, which of the following is the least concern?
B. Ciphertext-only attack
C. Social engineering
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is B. Ciphertext-only attack.
The ciphertext-only attack is one of the most common cryptographic attacks where only the ciphertext is available to the attacker. When we decide to implement wireless networks, we usually recognize the ubiquitous wireless signal emission is subject to being captured and the ciphertext-only attack. Since your company has decided to implement the solution, it means the residual risk has been accepted.
Every modern cipher attempts to provide protection against ciphertext-only attacks. Nonetheless poor cipher usage or reliance on home-grown proprietary algorithms that have not been subject to thorough scrutiny has resulted in many computer-age encryption systems that are still subject to ciphertext-only attack. (Wikipedia)
I coined the term, Session-bombing, based on the definition Zoom-bombing to maintain neutrality.
Zoombombing, Zoom-bombing, Zoom-attacks or Zoom raiding is the unwanted intrusion into a video conference call by an individual, causing disruption. The term became popularized in 2020, after the COVID-19 pandemic forced many people to stay at home and videoconferencing is used on a large scale by businesses, schools, and social groups. The term is associated with and derived from the name of the Zoom videoconferencing software program but it has also been used to refer to the phenomenon on other video conferencing platforms. (Wikipedia)
Remote conferencing may involve remote phone participants or teleconferencing users. The telephone line is subject to wiretapping. Unlocked or unprotected main distribution frame (MDF) or intermediate distribution frame (IDF) is vulnerable to wiretapping.
People are the weakest link in the chain of defense-in-depth. It is always subject to social engineering attacks.
- Remote Conferencing and Screencasting
- Zoom security issues: Here’s everything that’s gone wrong (so far)
A BLUEPRINT FOR YOUR SUCCESS IN CISSP
My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and informative reference for security professionals.
- It is available on Amazon.
- Readers from countries or regions not supported by Amazon can get your copy from the author’s web site.