1.2 Flashcards

1
Q

Malware

A

wide range of software that has malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

attackers take control of computers or networks locking out it’s users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptomalware

A

attackers encrypt the data on computers within a network to prevent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware and cryptoware attackers both demand

A

a ransom to be paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans

A

looks like something beneficial, but it’s actually something malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

self-replicating malware that travels throughout a network w/o the application of a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PUP (potentially unwanted programs)

A

programs that a user may not want, even if a user consented to download it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fileless virus

A

type of malicious software that runs in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command and Control

A

used to control infected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bots

A

software robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

left by an old employee or someone who has a grudge against an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

software installed on user’s systems w/o their awareness or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keyloggers

A

attempt to capture a user’s keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT (remote access trojan)

A

malware that allows attackers to control systems from remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkit

A

group of programs that hides the fact that the system has been infected or compromised by malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backdoor

A

another way of accessing a system and bypass normal authentication methods

17
Q

Password Attacks

A

attempt to discover, or bypass, passwords used for authentication on systems and files and for different types of files

18
Q

Online Password Attack

A

attempts to discover a password from an online system

19
Q

Offline Password Attack

A

attempt to discover passwords from a captured database/packet scan

20
Q

Brute Force Attacks

A

attempts to guess all possible character combos until username and passwords match

21
Q

Dictionary Attacks

A

uses dictionary words and attempts every word as the password to see if it works

22
Q

Spraying Attacks

A

an attacker will brute force logins based on list of usernames w/default passwords on the application

23
Q

Birthday Attacks

A

an attacker attempts to create a password that produces the same hash value as the user’s actual password

24
Q

Rainbow Table Attacks

A

type of attack that attempts to discover the password from a hash

25
Salting
method of preventing rainbow table, brute force and dictionary attacks
26
Plaintext/unencrypted Attacks
the attacker has knowledge of the plaintext and the corresponding ciphertext.
27
Malicious Universal/Serial Bus (USB)
cable that has an embedded Wi-Fi controller capable of receiving commands from nearby wireless devices (smartphones)
28
Malicious Flash Drive
one that includes malware configured to infect a computer when the drive is plugged in
29
Card Cloning
making a copy of credit card using data captured from a magnetic strip
30
Credit Card Skimming
capturing credit card data @ the time of sale
31
Adversarial Artificial Intelligence
attempts to fool artificial intelligence (AI) models by supplying it w/deceptive input
32
Tainted Data for Machine Learning (ML)
causes AI and ML systems to give inconsistent results.
33
Supply-Chain Attacks
disruption in the supply-chain. 3rd party risks
34
On-Premises
the organization retains complete control over all the cloud-based resources
35
Off-Premises
CSP (cloud service provider) performs the maintenance, but an organization doesn't know where the data is stored
36
Collision Attack
when two different inputs creates the same hash value.
37
Downgrade Attacks
forces a system to downgrade its security