Attacks, Threats, and Vulnerabilities Flashcards
viruses
An unsolicited and unwanted malicious program
Crypto-malware
A malicious program that encrypts programs and files on the computer in order to extort money from the user
Ransomware
Denies access to a computer system or data until a ransom is paid. Can be spread through a phishing email or unknowingly infected website
Worm
A self-contained infection that can spread itself through networks, emails, and messages
Trojan
A form of malware that pretends to be a harmless application
Rootkit
backdoor program that allows full remote access to a system
Keylogger
A malicious program that saves all of the keystrokes of the infected machine.
Adware
A program that produces ads and pop ups using your browser, may replace the original browser and produce fake ads to remove the adware in order to download more malware
Spyware
Software that installs itself to spy on the infected machine, sends the stolen information over the internet back to the host machine
Bots
AI that when inside an infected machine performs specific actions as a part of a larger entity known as a botnet
RAT (Remote Access Trojan)
A remotely operated Trojan.
Logic bomb
A malicious program that lies dormant until a specific date or event occurs
Backdoor
Allows for full access to a system remotely
Phishing
Sending a false email pretending to be legitimate to steal valuable information from the user
Spear phishing
Attacks that target specific users
Whaling
An attack on a powerful or wealthy individual
Vishing
An attack through a phone or voice communications
Tailgating
Closely following individuals with keys to get access to secure areas
Impersonation
Taking on the identity of an individual to get access into the system or communications protocol
Dumpster diving
Going through a business’s or person’s trash to find thrown away valuable information or possessions
Shoulder surfing
Watching as a person enters information
Hoax
False information that deceives the user into compromising security by making them believe they are at risk
Watering hole attack
A security attack that targets a specific highly secured group by infecting a commonly visited website by the group’s members
Authority
The actor acts as an individual of authority
Intimidation
Frightening or threatening the victim
Consensus
Influenced by what others do, everyone else does it.
Scarcity
Limited resources and time to act.
Familiarity
The victim is well known
Trust
Gain their confidence, be their friend
Urgency
Limited time to act, rush the victim.
Application/service attacks: DoS (Denial of Service):
Flooding a target machine or resource with many requests to overload the system and prevent use of its resources
Application/service attacks: DDoS (Distributed Denial of Service)
Multiple different sources attack one victim.
Application/service attacks: Man-in-the-middle
The attacker alters the communication between two parties who believe they are directly communicating
Application/service attacks: Buffer overflow
A program attempts to write more data than can be held in fixed block of memory
Application/service attacks: Injection
Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution
Application/service attacks: Cross-site scripting (XXS)
Found in web applications, allows for an attacker to inject client-side scripts in web pages
Application/service attacks: Cross-site request forgery (XSRF)
Unauthorized commands are sent from a user that is trusted by the website. Allows the attacker to steal cookies and harvest passwords
Application/service attacks: Privilege escalation
An attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing
Application/service attacks: ARP poisoning
The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP
Application/service attacks: Amplification
The amount of traffic sent by the attacker is originally small but then is repeatability multiplied to place a massive strain on the victim’s resources, in an attempt to cause it to fail or malfunction
Application/service attacks: DNS poisoning
Is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones