Ch 6. Threats and Vulnerabilities Flashcards
Open-Source Intelligence
a method of garnering data using public sources, such as social media sites and news outlets
Script Kiddie
an attacker with little expertise or sophistication, they use existing scripts to launch attacks
Hacktivist
an attacker who launches attacks as part of an activist movement or to further a cause
Insider
an attacker who launches attacks from within an organization, typically as an employee
APT
Advanced Persistent Threat; a group that has both the capability and intent to launch sophisticated and targeted attacks
Resource Exhaustion
result of DDoS attack; overloads a computer’s resources (such as processor/memory), resulting in service interruption
DDoS
(Distributed) Denial of Service; an attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users
Malware
malicious software such as viruses, worms, ransomware, etc
Virus
malicious code that attaches itself to a host application, the app must be executed to run
Worm
self-replicating malware that travels through a network, worms do not need user interaction to execute
Logic Bomb
a type of malware that executes in response to an event. Might be specific in date or time, or a user action
Backdoor
an alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it
Trojan
malware that looks useful but is malicious
RAT
Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location
Ransomware
a type of malware used to extort money from individuals and organizations. Typically encrypts the user’s data and demands a ransom before decrypting the data
Crypto-Malware
a type of malware that encrypts a user’s data
Keylogger
software or hardware use to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker
Spyware
software installed on a user’s systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity
Adware
software on ads that tracks user activity
Rootkit
a type of malware that has system-level access to a comp. Rootkits are often able to hide themselves from users and antivirus software
Social Engineering
the practice of using social tactics to gain information
Shoulder Surfing
the practice of looking over someone’s shoulder to obtain info from their comp screen
Screen Filter
a physical security device used to reduce visibility of a comp screen. Screen filters help prevent shoulder surfing
Hoax
a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist
Tailgaiting
a social engineering attack where one person follows behind another person without using credentials
Mantrap
a physical security mechanism designed to control access to a secure area, prevents tailgating
Dumpster Diving
the practice of searching through trash looking to gain information from discarded documents
Watering Hole Attack
an attack that infects web sites that a group is likely to trust and visit
Spam
unwanted or unsolicited email. Attackers often launch attacks using spam
Phishing
the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link
Spear Phishing
a targeted form of phishing. Spear phishing attacks attempt to target specific groups of users, such as those within a specific organization, or even a single user
Whaling
a form of spear phishing that attempts to target high-level executives
Privilege Escalation
the process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges
Vishing
use of VoIP for phishing
DEP
Data Execution Prevention; a security feature that prevents code from executing in memory regions marked as nonexecutable, helps prevent malware
Spam Filter
method of blocking unwanted email
Zero-Day Vulnerability
a vulnerability or bug that is unknown to trusted sources but can be exploited by attacked