1.2 Flashcards
Malware
wide range of software that has malicious intent
Ransomware
attackers take control of computers or networks locking out it’s users
Cryptomalware
attackers encrypt the data on computers within a network to prevent access
Ransomware and cryptoware attackers both demand
a ransom to be paid
Trojans
looks like something beneficial, but it’s actually something malicious
Worms
self-replicating malware that travels throughout a network w/o the application of a host
PUP (potentially unwanted programs)
programs that a user may not want, even if a user consented to download it.
Fileless virus
type of malicious software that runs in memory
Command and Control
used to control infected computers
Bots
software robots
Logic Bombs
left by an old employee or someone who has a grudge against an organization
Spyware
software installed on user’s systems w/o their awareness or consent
Keyloggers
attempt to capture a user’s keystrokes
RAT (remote access trojan)
malware that allows attackers to control systems from remote locations
Rootkit
group of programs that hides the fact that the system has been infected or compromised by malicious code
Backdoor
another way of accessing a system and bypass normal authentication methods
Password Attacks
attempt to discover, or bypass, passwords used for authentication on systems and files and for different types of files
Online Password Attack
attempts to discover a password from an online system
Offline Password Attack
attempt to discover passwords from a captured database/packet scan
Brute Force Attacks
attempts to guess all possible character combos until username and passwords match
Dictionary Attacks
uses dictionary words and attempts every word as the password to see if it works
Spraying Attacks
an attacker will brute force logins based on list of usernames w/default passwords on the application
Birthday Attacks
an attacker attempts to create a password that produces the same hash value as the user’s actual password
Rainbow Table Attacks
type of attack that attempts to discover the password from a hash