1.2 Attack Types Flashcards

1
Q

Define Ransomware

A

Denying one access to their data until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Trojan

A

Malicious software disguised as a valid program to trick users into installing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Worm

A

Malware that can spread without any human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a virus and a worm?

A

Virus requires human interaction to be installed, a worm is able to install and spread itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Potentially unwanted programs (PUPs)

A

Programs that aren’t necessarily harmful, but cause unwanted annoyances, like pop-up ads, alternate internet search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do fileless viruses evade detection?

A

By running as a valid process, such as Flash, JavaScript, or PowerShell, modify registry to add to start-up programs/processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Fileless virus

A

A virus that runs in memory but is never installed to the hard drive and evades detection by anti-virus programs with this technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Command and Control

A

Server that controls the bots established in a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Bots/Botnet

A

Infecting multiple computers with a virus to launch complex attacks coming from multiple locations, such as a DDoS (Distributed Denial of Service) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Crypto-malware

A

Type of ransomware that encrypts ones data until a ransom is paid to get the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to protect against crypto-malware attacks (other than anti-virus/malware)?

A

Keep system backups on device inaccessible from the computer/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Logic Bomb

A

Malware designed to take action in the future based on a date or action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Spyware

A

Malware that forwards information, such as keystrokes or internet browsing history, to a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Keylogger and its attack advantage (2)

A
  1. Malware that can send typed input, clipboard data and screenshots to an attacker
  2. bypasses encryption so can get passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Remote access trojan (RAT)

A

Malware that allows complete remote control of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Rootkit

A

Malware that embeds in the kernel of the OS and is very difficult to remove or detect

17
Q

What is the best way to protect against Rootkits?

A

UEFI BIOS secure boot to prevent boot if kernel has been modified

18
Q

Define Backdoor

A

Creation of an opening in the system to bypass security and allow installation of other malware or remote system access

19
Q

Define Password attack - Spraying

A

To avoid account lockout, just a few common passwords from a list are tried before moving on

20
Q

Define Password attack - Dictionary

A

Sub-type of brute force attack that uses a pre-defined list of common words to find a password match

21
Q

Define Password Attack - Offline vs Online

A
  1. An online password attack has limited potential since actively trying username/passwords is limited to a certain number of failed attempts before the account is locked out
  2. Offline password attacks are done by obtaining the files containing usernames/passwords and then cracking those with equipment offline or separate from the live website or organization
22
Q

Define Password attack - Brute force

A

Trying every possible combination of letters, numbers and characters until the password match is found

23
Q

Define Password attack - Rainbow tables

A

A dictionary that stores the hashed result of the plaintext password, instead of the plaintext

24
Q

Define Password attack - Plaintext/unencrypted

A

Passwords stored as plaintext, if compromised, every password in that file or database are compromised

25
Q

Malicious USB cable

A

Normal looking USB cable that has additional electronics inside allowing it to compromise any system that it is plugged into

26
Q

Malicious flash drive

A
  1. Same capabilities as malicious USB cable
  2. Also can have malware embedded in normal looking files that executes upon opening the file
27
Q

Card cloning

A

Copying the magnetic strip of a card onto a new card that an attacker can use

28
Q

True/False: Chips on cards can be cloned

A

False

29
Q

Skimming

A

Obtaining card information from the magnetic strip when a card is swiped or from the system that has the magnetic strip reader

30
Q

Adversarial AI - Tainted training data for machine learning (ML)

A

Providing invalid data to an AI system to influence its learning process so that it produces a malicious output, also called “poisoning”

31
Q

Adversarial AI - Security of machine learning algorithms

A

If AI data has personal information, attackers can figure out how to manipulate the AI to obtain that information

32
Q

Supply-chain attacks

A

Exploitation of vendors used by an organization for attacks

33
Q

2 Examples of Supply-chain attacks

A
  1. Compromising equipment before vendor delivers it to the organization
  2. Compromising security credentials vendor uses to access the organization
34
Q

Advantage of using on-premises infrastructure

A

Complete control and knowledge of the security of stored data

35
Q

Advantages of using cloud-based infrastructure (2)

A
  1. Advantages of large-scale, higher, security that may be out of budget or skill for an organization to implement
  2. Implementing changes is much since it usually involves just spinning up a virtual device
36
Q

Cryptographic attack - Birthday

A

A brute force attack to break encryption due to hash collisions

37
Q

Cryptographic attack - Collision

A

When a hashing algorithm produces the same hash for at least 2 different inputs

38
Q

How to prevent birthday/collision based attacks

A

Use longer hashes

39
Q

Cryptographic attack - Downgrade

A

A man-in-the-middle attack that influences the encryption level chosen between 2 end devices for the transport of data to be a lower, less secure encryption so that it can be more easily broken and intercept the communication