1.4 Cyber-attack Techniques and Types Flashcards

1
Q

Exploit

A

A small piece of software code, part of a malformed data file, or a sequence (string) of commands that leverages a vulnerability in a system or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A
  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Anti-AV
  • Logic bombs (specific condition)
  • Back doors
  • Rootkits (root access)
  • Spyware and adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Characteristics and capabilities of advanced malware

A
  • Distributed, fault-tolerant architecture
  • Multi-functionality
  • Polymorphism and metamorphism
  • Obfuscation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creation of an exploit data file

A
  1. Embed a small piece of malicious code within the data file.
  2. Memory corruption that allows the attacker’s code to be inserted into the execution flow of the vulnerable software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most common delivery methods for Malware

A

Spam and Phishing emails (45 - 75%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam and Phishing

A
  • Spear phishing (more widely used)
  • Whaling
  • Watering hole (compromise website)
  • Pharming (DNS poisoning)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly