1.2 Analyze potential indicators to determine the type of attack Flashcards
Malware
-Ransomware
Malware
-Trojans
Malware
-Worms
Malware
-Potentially unwanted programs (PUPs)
Malware
-Fileless virus
Malware
-Command and control
Malware
-Bots
Malware
-Cryptomalware
Malware
-Logic bombs
Malware
-Spyware
Malware
-Keyloggers
Malware
-Remote access Trojan (RAT)
Malware
-Rootkit
Malware
-Backdoor
Password attacks
-Spraying
Password attacks
-Dictionary
Password attacks
-Bruteforce online/offline
Password attacks
-Rainbow table
Password attacks
-Plaintext/unencrypted
Physical attacks
-Malicious Universal Serial Bus (USB) cable
Physical attacks
-Malicious flash drive
Physical attacks
-Card cloning
Physical attacks
-Skimming
Adversarial artificial intelligence (AI)
-Tainted training data for machine learning (ML)
Adversarial artificial intelligence (AI)
-Security of machine learning algorithms
Supply-chain attacks
Could-based vs. on-premise attacks
Cryptographic attacks
-Birthday
Cryptographic attacks
-Collision