Ch 6. Threats and Vulnerabilities Flashcards

1
Q

Open-Source Intelligence

A

a method of garnering data using public sources, such as social media sites and news outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

an attacker with little expertise or sophistication, they use existing scripts to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

an attacker who launches attacks as part of an activist movement or to further a cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider

A

an attacker who launches attacks from within an organization, typically as an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat; a group that has both the capability and intent to launch sophisticated and targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Resource Exhaustion

A

result of DDoS attack; overloads a computer’s resources (such as processor/memory), resulting in service interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

(Distributed) Denial of Service; an attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

malicious software such as viruses, worms, ransomware, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

malicious code that attaches itself to a host application, the app must be executed to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

self-replicating malware that travels through a network, worms do not need user interaction to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

a type of malware that executes in response to an event. Might be specific in date or time, or a user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backdoor

A

an alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan

A

malware that looks useful but is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT

A

Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

a type of malware used to extort money from individuals and organizations. Typically encrypts the user’s data and demands a ransom before decrypting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Crypto-Malware

A

a type of malware that encrypts a user’s data

17
Q

Keylogger

A

software or hardware use to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker

18
Q

Spyware

A

software installed on a user’s systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity

19
Q

Adware

A

software on ads that tracks user activity

20
Q

Rootkit

A

a type of malware that has system-level access to a comp. Rootkits are often able to hide themselves from users and antivirus software

21
Q

Social Engineering

A

the practice of using social tactics to gain information

22
Q

Shoulder Surfing

A

the practice of looking over someone’s shoulder to obtain info from their comp screen

23
Q

Screen Filter

A

a physical security device used to reduce visibility of a comp screen. Screen filters help prevent shoulder surfing

24
Q

Hoax

A

a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist

25
Q

Tailgaiting

A

a social engineering attack where one person follows behind another person without using credentials

26
Q

Mantrap

A

a physical security mechanism designed to control access to a secure area, prevents tailgating

27
Q

Dumpster Diving

A

the practice of searching through trash looking to gain information from discarded documents

28
Q

Watering Hole Attack

A

an attack that infects web sites that a group is likely to trust and visit

29
Q

Spam

A

unwanted or unsolicited email. Attackers often launch attacks using spam

30
Q

Phishing

A

the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link

31
Q

Spear Phishing

A

a targeted form of phishing. Spear phishing attacks attempt to target specific groups of users, such as those within a specific organization, or even a single user

32
Q

Whaling

A

a form of spear phishing that attempts to target high-level executives

33
Q

Privilege Escalation

A

the process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges

34
Q

Vishing

A

use of VoIP for phishing

35
Q

DEP

A

Data Execution Prevention; a security feature that prevents code from executing in memory regions marked as nonexecutable, helps prevent malware

36
Q

Spam Filter

A

method of blocking unwanted email

37
Q

Zero-Day Vulnerability

A

a vulnerability or bug that is unknown to trusted sources but can be exploited by attacked