Attacks Flashcards

1
Q

What is Cross-site scripting (XSS)?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

Software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Ransomeware?

A

This involves encrypting a victims data and cash is demanded in order for the threat actor to decrypt your data. The OS remains available in order to for the threat actor to remain in contact with you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a Virus?

A

This is Malware that can replicate itself and needs you to run a program - Reproduces itself through the system or over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some ways in which your machine can become infected with Malware

A

E-mail link
Clicking on a web page pop
Drive-by download
A worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some Virus types

A

Program Virus
Boot sector virus
Script viruses
Macro viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a Worm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define bloatware?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Spyware?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you protect against Spyware?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a logic bomb?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you prevent a logic bomb?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define a rootkit?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you find and remove rootkits?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a threat vector?

A

A method used by the attacker to gain access to your system - Also called an attack vector

17
Q

What are the threats of removable devices within an organisation and how can this be managed?

A

Malicious software on USB devices can get around the network therefore circumventing high security networks ie fire walls

Data exfiltration - These devices can be used to exfiltrate company data by a malicious insider or a threat actor who has physical access to machines

Data loss - This could be intentional or accidental

Compliance violations - Require strict control over sensitive data including how it is stored, transferred and accessed. Allowing unrestricted use can lead to data transfers that violate compliance policies

Removable media does not typically have encryption enabled which can lead to unprotected storage of sensitive data

Ways to mitigate this threat:

18
Q

What are the threats of unsupported systems within an organisation and how can this be managed?

A

Unsupported systems pose a threat as they no longer receive security patches, updates or technical support from the vendor.

The following are issues of having unsupported systems:

Increased likelihood of a security exploit as they no longer receive patches to address newly discovered vulnerabilities.

Lack of vendor support and limited incident response

Potential for incompatibility with security tools like endpoint detection or encryption protocols

Some systems may lack critical data protection features

Ways to mitigate this threat:

Organisations should plan to upgrade unsupported systems wherever possible and implement mitigating controls like additional monitoring, limiting access, segmenting unsupported systems from critical networks

19
Q

What is a keylogger?

A