1.2 Given a scenario, analyze potential indicators to determine the type of attack Flashcards
Back Door
UNDOCUMENTED undocumented command sequences that allow individuals with knowledge of the back door to BYPASS normal access restrictions.
Rootkit
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Crypto-malware
Ransomware that encrypts files stored on a computer or mobile device in order
to extort money.
Hoaxes
are a nuisance that result in wasted resources. Used to spread
Logic Bombs
are malicious code objects that infect a system and lie dormant until they are triggered
Trojan Horse
a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network.
Worm
Malware that makes copies of it self without human interaction
PUP
Potineally unwanted programs
Programs that may be a unwanted program
Keylogger
Logs/copies key strokes
Spyware
Malware used to obtain information on a person, system, or organization
Fileless Virus
malious code that resides in RAM
Command Control
a computer CONTROLLED BY AN ATTACKER or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.
RAT
remote access trojan
Malware program that gives an intruder ADMIN access over a computer
Ransomware
Attacker locks the users files, then request a a ransom to unlock them
Dictionary Attacks
Attacker uses common/dictionary words too obtain access