1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards

1
Q

Malware

A

Any element of software performing an unwanted function from perspective of a legit user/owner of system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

Encrypts a user’s data, demanding ransom in return for decrypting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojans

A

Means of delivering malicious software disguising inside a benign host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Self-contained applications that don’t require becoming attached directly to a host file or hard drive to infect a system. Focused on replication and distribution, rather than damage and destruction. Also be designed as delivery mechanisms to deposit other types of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Potentially unwanted programs (PUPs)

A

Any type of questionable software not specifically malware but still otherwise unwanted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

Programs designed to spread from one system to another through self-replication and perform a wide range of malicious activities. Reside in memory only, do not save themselves to local storage devices

Forms:

Common/file

Boot sector

Fileless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and control (C&C or C2)

A

Intermediary serving as host of connection between attacker and bots where commands are distributed and info exchanged. Assists attacker in remaining anonymous while controlling botnet agents.

Any communications system can be used as C&C including internet relay chat (IRC) channels, IM, FB accounts, Twitter accounts, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots

A

It is used to describe a massive deployment of malicious code onto numerous compromised systems that are all remotely controlled by a hacker. The term botnet is a shortened form of the phrase “software robot network”.

Although they’re most commonly known to be used to perform DoS flooding attacks, they can also be used to transmit spam, password cracking, or perform any other malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptomalware (aka crypto mining/jacking)

A

Uses system resources to mine cryptocurrencies, often designed to remain hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logic bombs

A

Form of malicious code remaining dormant until triggering event/condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Form of malicious code collecting info about users w/o knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keylogger

A

A PUP recording keystrokes. Usually stored in a file, sometimes stored in memory until transported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote access trojan (RAT)

A

Malware granting a level of remote control access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

Malware embedded w/in OS. Can manipulate system info seen by OS and displayed to users, may replace OS kernel, device drivers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Backdoor

A

Refers to two types of attacks/problems:

Developer installed access method bypassing security restrictions, hard-coded account, password, or command sequence.

hacker installed remote-access remote-control tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spraying (aka Credential Stuffing)

A

Attempt to log into a user account through repeated attempts of submitting generated or pulled-from-a-list creds

16
Q

Dictionary attack

A

Password guessing by using a precompiled list of possible passwords

17
Q

Brute force

A

Tries every possible valid combination of characters to construct possible passwords

18
Q

Offline password attack

A

When not working against a live target system, but instead on an offline copy

19
Q

Online password attack

A

Against a live logon prompt

20
Q

Rainbow table

A

Pre-computed hash tables, comparing hash values to the table to find the plaintext password

21
Q

Plaintext/unencrypted

A

Clear-text/unencrypted passwords are unacceptable

22
Q

Malicious Universal Serial Bus (USB) cable

A

Device crafted to perform unwanted activities against a computer and/or mobile device or peripheral

23
Q

Malicious Flash Drive

A

A USB drive, typically pre-loaded with malware, is physically left in a location with the intent that an unsuspecting individual will pick it up and plug it into a computer.

24
Q

Card cloning

A

Duplication or skimming of data from a targeted source card and writing it onto a new card

25
Q

Skimming

A

A fast and interactive way to quickly obtain payment card data and personal information from ATMs and checkout scanners.

26
Q

Adversarial artificial intelligence (AAI or AML)

A

When computational systems are set up to operate in opposition to automate process of developing system defenses and attacks

27
Q

Generative Adversarial Network (GAN)

A

Works by generating data samples from the statistical distribution of the data from a generator network and a discriminator network.

28
Q

Tainted Training Data for ML

A

a type of attack in which the attacker intentionally provides incorrect or biased data to the machine learning model during the training phase.

29
Q

Supply-chain attacks

A

A type of cyberattack that targets a trusted third-party vendor who offers services or software vital to the supply chain. Inject malicious code into an application in order to infect all users of an app

30
Q

Cloud-based vs. on-premises attacks

A

Cloud security is just as important as on-premises security, and in some cases, it can be even more secure. Many companies are hesitant to move to the cloud, fearing that it is not as secure as on-premises infrastructure. However, this is a misconception

31
Q

Birthday

A

Used against hashing and other forms of cryptography involving finite sets (either hashes or keys)

32
Q

Collision

A

When output of two cryptographic operations produce the same result, having different inputs. Tries to find two inputs producing the same hash value

33
Q

Downgrade

A

Prevents client from successfully negotiating robust high-grade encryption, generally rolling back to earlier versions of encryption protocols

34
Q
A