Attack Types Flashcards

Overview of malware, virus and types of cyber attacks

1
Q

Malicious software that will have a negative impact in your computer.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that can reproduce itself but needs the user to click on or launch the application to start its process.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware that self-replicates itself and doesn’t need user intervention.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of malware that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it hard to detect and remove.

A

Fileless Virus/Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware on your system that requires you to give money for the attackers to give access back to your computer.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses cryptography to be able to encrypt all your personal information unless you have the proper key by sending bitcoin/money to your attackers.

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software that pretends to be something else. Doesn’t care about replicating.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unwanted program commonly downloaded by a Trojan Horse software.

A

PUP (Potentially Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Way to easily reconnect back with an infected system. Created by the malware itself and can be used by multiple types of malware on the same system.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote administration tool that gives 3rd parties access to your computer to have almost complete control over your computer.

A

RATs - Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can be found on any OS and modify files in the kernel of the OS. Can be invisible to the OS and antivirus software.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware that throws advertisement all over your computer. Pop-ups, with pop-ups. Can be installed accidentally.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware that spies on you.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of spyware that captures every keystroke you type

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stands for robot, term to describe the automation that occurs BTS when your system is taken over by this type of malware.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Group of bots working together. Distributed by DDoS.

A

Botnets

17
Q

Attack that occurs when a separate event is triggered. Commonly left by people with a grudge or recently fired employees. Example, time bombs, user events, or logic action. Many delete themselves once executed.

A

Logic Bomb

18
Q

When attackers can read passwords because the app stored them in the clear (plaintext) instead of a hashing format.

A

Plaintext/unencrypted passwords

19
Q

Cryptographic algorithm that cannot be reversed. Fixed-length string of text message digest or ‘fingerprint’.

A

Hashing password

20
Q

Avoids the results of a lock account, and will try some common passwords before moving on to the next account. This avoids them alarms.

A

Spraying Attack

21
Q

Try every possible password combination until the hash is matched.

A

Brute Force

22
Q

Attacker uses common words taken from a dictionary and check if the password is one of those. These programs can substitute letters.

A

Dictionary Attacks

23
Q

Type of database that contains pre-calculated hash chains. Speed increase, and need different tables for different types of hashes.

A

Rainbow tables

24
Q

Random data added to the password when hashing. Every user gets one added to their password. Rainbow tables don’t work with this type.

A

Salt

25
Q

Steals credit card information as its been used and copies it from the magnetic stripe or gathering from the OS in the computer you are using. Includes a camera to see what numbers you press for the PIN.

A

Skimming

26
Q

Makes decisions and finds different patterns based on data.

A

Machine Learning

27
Q

Attackers find ways to avoid AI patterns of training to poison it.

A

Evasion Attacks

28
Q

Attack designed to affect many victims from one broad attack vector.It includes many moving parts: raw materials, suppliers, manufacturers, distributors, customers, and consumers. Attackers can infect any step through the process.

A

Supply Chain

29
Q

Type of security that is centralized and costs less. No dedicated hardware, no data center to secure and third-party handles everything.

A

Cloud-based security

30
Q

Type of security that puts the burden on the client. Data center security and infrastructure costs.

A

On-premises

31
Q

Doesn’t have the key to decrypt the data so they use different ways to access by looking for cryptographic vulnerabilities. The problem is not cryptography, but the way is implemented.

A

Cryptographic Attacks

32
Q

Same hash value for two different plaintexts.

A

Hash Collision

33
Q

Attack in which the attacker tries to force two hosts on a network to use an insecure or weakly protected data transmission protocol.

A

Downgrade attack

34
Q

Process of generating different versions of the same malware program with different source code.

A

Polymorphism