2.2 Survey of Malicious Activities Flashcards

1
Q

Malware Attacks

A

Ransomware: Encryption of files for ransom.
Trojan Horses: Malicious software disguised as legitimate software.
Remote Access Trojans (RATs): Allow remote control of infected systems.
Worms: Self-replicating malware that spreads across networks.
Viruses: Malicious code that attaches to executable files.
Spyware: Software that collects personal information without consent.
Keyloggers: Record keystrokes to steal sensitive information.
Logic Bombs: Malware triggered by specific events.
Rootkits: Malicious software that hides its presence and gains system control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Attacks

A

Brute Force Attacks: Trying all possible combinations to gain access.
RFID Cloning: Cloning RFID cards to gain unauthorized access.
Environmental Attacks: Exploiting vulnerabilities in environmental control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Attacks

A

DoS/DDoS Attacks: Overwhelming a system or network with traffic.
DNS Attacks: Targeting DNS servers to disrupt service or redirect traffic.
Wireless Attacks: Exploiting vulnerabilities in wireless networks, such as rogue access points and man-in-the-middle attacks.
Credential Replay Attacks: Reusing captured credentials to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application Attacks

A

SQL Injection: Injecting malicious SQL code into web applications.
Buffer Overflow: Exploiting vulnerabilities in software to execute malicious code.
Replay Attacks: Reusing captured network traffic to gain unauthorized access.
Privilege Escalation: Gaining higher-level privileges on a system.
Cross-Site Request Forgery (CSRF): Tricking users into performing unintended actions.
Directory Traversal: Accessing unauthorized files and directories on a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographic Attacks

A

Downgrade Attacks: Forcing systems to use weaker cryptographic protocols.
Collision Attacks: Finding two different inputs that produce the same hash.
Brute Force Attacks: Guessing passwords or cryptographic keys.Side-Channel Attacks:
Exploiting physical characteristics of cryptographic implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password Attacks

A

Brute Force Attacks: Trying all possible password combinations.
Dictionary Attacks: Using a list of common passwords.
Spraying Attacks: Trying the same password against multiple accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Indicators of Compromise (IoCs)

A

Account lockouts
Concurrent session usage
Blocked content
Impossible travel
Resource consumption
Out-of-cycle logging
Missing logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly