Ch 6. Threats and Vulnerabilities Flashcards
Open-Source Intelligence
a method of garnering data using public sources, such as social media sites and news outlets
Script Kiddie
an attacker with little expertise or sophistication, they use existing scripts to launch attacks
Hacktivist
an attacker who launches attacks as part of an activist movement or to further a cause
Insider
an attacker who launches attacks from within an organization, typically as an employee
APT
Advanced Persistent Threat; a group that has both the capability and intent to launch sophisticated and targeted attacks
Resource Exhaustion
result of DDoS attack; overloads a computer’s resources (such as processor/memory), resulting in service interruption
DDoS
(Distributed) Denial of Service; an attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users
Malware
malicious software such as viruses, worms, ransomware, etc
Virus
malicious code that attaches itself to a host application, the app must be executed to run
Worm
self-replicating malware that travels through a network, worms do not need user interaction to execute
Logic Bomb
a type of malware that executes in response to an event. Might be specific in date or time, or a user action
Backdoor
an alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it
Trojan
malware that looks useful but is malicious
RAT
Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location
Ransomware
a type of malware used to extort money from individuals and organizations. Typically encrypts the user’s data and demands a ransom before decrypting the data