CH8 Flashcards
Type of Exploits (Common attacks) includes:
Ransomware
Viruses
Worms
Trojan horses
Blended threat
Spam
Distributed denial-of-service attacks
Rootkits
Advanced persistent threat
Phishing, spear-phishing, smishing and vishing
Identity theft
Cyberespionage and cyberterrorism
Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker
Ransomware
A piece of programming code (usually disguised as something else) that causes a computer to behave in an unexpected and undesirable manner
Viruses
(Worms/viruses) Spread to other machines when a computer user shares an infected file or sends an email with a virus-infected attachment
virus
A harmful program that resides in the active memory of the computer and duplicates itself
worms
T/F: Worms can propagate without human intervention.
true
A seemingly harmless program in which malicious code is hidden
Trojan Horses
(Worms/Trojan horses) is when a victim on the receiving end is usually tricked into opening it because it appears to be useful software from a legitimate source.
Trojan Horse
The (Ransomware/Trojan Horse) program’s harmful payload might be designed to enable the attacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or spy on users
trojan horse
T/F: Ransomware often creates a “backdoor” on a computer that enables an attacker to gain future access
f, trojan horse
A type of Trojan horse that executes when it is triggered by a specific event
Logic bomb
A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload
Blended Threat
(Blended Threat/Spam/Trojan Horse) might use server and Internet vulnerabilities to initiate and then transmit and spread an attack using EXE files, HTML files, and registry keys
blended threat
The use of email systems to send unsolicited email to large numbers of people
Spam
T/F: Spam is also an inexpensive method of marketing used by many legitimate organizations
true
software generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks
Distributed Denial-of-Service Attacks (DDoS)
T/F: Distributed Denial-of-Service Attacks keeps target so busy responding to requests that legitimate users cannot get in.
true
A large group of computers, controlled from one or more remote locations by hackers, without the consent of their owners
Botnet
Sometimes called zombies
Botnet
T/F: Botnets are frequently used to distribute spam and malicious code
true
A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
Rootkit
Attackers can use the ______ to execute files, access logs, monitor user activity, and change the computer’s configuration
rootkit
Symptoms of rootkit infections:
- Computer locks up or fails to respond to input from the keyboard
- Screen saver changes without any action on the part of the user
- Taskbar disappears
- Network activities function extremely slow