1.2 Analyze potential indicators to determine the type of attack Flashcards
Any element of software that performs an unwanted function from the perspective of the legitimate user or owner of a computer system.
Malware
A form of malware that takes over a computer system, usually by encrypting user data, to hinder its use while demanding payment.
Ransomware
A means of delivering malicious software by disguising it inside of something useful or legitimate.
Trojans (Trojan Horse)
Malware designed to exploit a specific vulnerability in a system and then use that flaw to replicate themselves to other systems. They typically focus on replication and distribution, rather than on direct damage and destruction.
Worms
Any type of questionable software that is not specifically malware but is still otherwise unwanted on a typical computer system.
Potentially Unwanted Programs (PUPS)
A type of malware that resides in the memory only and does not save itself to the local storage devices
Fileless Virus
An intermediary communication service often used by botnets.
Command and Control
The infection agents that make up a botnet.
Bots
A network of systems infected by malicious software agents controlled by a hacker to launch massive attacks against targets.
Botnet
A form of malware that uses the system resources of an infected computer to mine cryptocurrencies.
Cryptomalware
A form of malicious code that remains dormant until a triggering event or condition occurs.
Logic Bombs
Any form of malicious code or even business or commercial code that collects information about users without their direct knowledge or permission.
Spyware
A form of unwanted software that records the keystrokes typed into a system’s keyboard.
Keylogger
A form of malicious code that grants an attacker some level of remote-control access to a compromised system.
Remote Access Trojan (RAT)
A special type of hacker tool that embeds itself deep within an operating system, where it can manipulate information seen by the OS and displayed to users.
Rootkit
A developer installed access method bypasses any and all security restrictions, or a hacker installed remote=access client.
Backdoor
Seeks to reverse engineer password hashed through attacks such as: Brute force(birthday attack), dictionary, hybrid and rainbow table attacks.
Password Attacks
The attempt to log into a user account through repeated attempts of submitting generated or pulled-from-a-list credentials.
Spraying (Stuffing)
An attack that that performs password guessing by using a preexisting or precompiled list of possible passwords.
Dictionary Attack
An attack that tries every valid combination of characters to construct possible passwords
Brute Force Attack (Birthday Attack)
An attack where the attacker is working on their own independent computers to compromise a password hash.
Offline Brute Force
An attack that occurs against a live logon prompt.
Online Brute Force
A tool that takes advantage of a concept know as a hash chain. Relatively fast password cracking is achieved at the expense of spending the time and effort beforehand to craft the table hash chain database.
Rainbow Tables
When online occurs against a live logon prompt. When offline this attack is one where the attacker is working on their own independent computers to compromise the hash.
Password attacks/cracking (online/offline)
Plaintext/unencrypted
Includes attempts to gain access into a facility, damage a facility, steal equipment, damage equipment, plant software or listening devices, clone data, and physically harm personnel.
Physical attacks
A device crafted to perform unwanted activities against a computer and/or mobile device or peripheral without the victim realizing the attack is occurring. Attacks include exfiltration of data and injecting malware.
Malicious universal serial bus cables (USB) /flash drives
The duplication of data from a targeted source card onto a blank new card.
Card cloning (skimming)
A training or programming technique where computational systems are set up to operate in opposition to automate the process of developing system defenses and attacks.
Adversarial AI (AAI)/Adversarial ML(AML)
Attacks that could result in flawed or less reliable products or could allow for remote access or listening mechanisms to be embedded into otherwise functioning equipment.
Supply Chain Attacks
Used against hashing and other forms of cryptography involving finite sets (of either hashes or keys).
Birthday attacks (crypt attack)
When the output of two cryptography operations produces the same result.
Collision attacks (crypt attack)
Attempts to prevent a client from successfully negotiating robust high-grade encryption with a server.
Downgrade attacks (crypt attack)
Malicious code that displays pop-ups or alternate advertisements to users based on their activities, URLs they have visited, applications they have accessed, and so on.
Adware (crypt attack)
Attacks that are more likely a matter of opportunity, in that the attacker found a flaw in a online service and your account just happened to be hit in the process.
Cloud based attacks
Attacks intentionally focused on your organization.
On premises attacks