1.2 analyze potential indicators to determine the type of attack Flashcards

1
Q

crypto-malware

A

the process of encrypting the files in a ransomware attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RAT

A

Remote Access Trojan

malware designed to allow an attacker to remotely control an infected computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logic Bomb

A

a piece of code that is intentionally inserted into software to trigger a malicious function when certain conditions are met
- user event
- time or date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adversarial AI

A

poison training data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supply Chain Attacks

A

attack a distributor or servicer in the chain
limit vendors and contractors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Birthday Attack

A

a brute force attack that uses the birthday paradox to find collisions in a hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command and Control

A

C2 attack
method that cybercriminals use to communicate with compromised devices within a target company’s network. In a C&C attack, an attacker uses a server to send commands to — and receive data from — computers compromised by malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly