Chapter 1.2 - Attack Types Flashcards
Given a scenario, analyze potential indicators to determine the type of attack
Malware
Malicious software used to intend harm and gather information
Ransomware
Taking away data and requiring victim to pay to get it back
Trojans
Software that pretends to be something else to conquer your computer
Worms
Malware that self-replicates itself
Does NOT need to be executed by the user
Potentially Unwanted Programs (PUPs)
Usually downloaded by trojans
Software that a user may perceive as unwanted or unnecessary
File less Virus
A stealth attack operated in memory
Avoids anti-virus detection and is never installed in a file or application
Command and Control
Responsible for sending out commands to bots
Bots (Robots)
A type of software application or script that performs automated tasks on command
Cryptomalware
Newer generation of ransomware
Uses cryptography to encrypt victim information and sends the victim the key to decrypt if the victim sends them cryptocurrency
Logic Bombs
Waits for a predefined moment before attack is executed
Example: time, date, event
Keyloggers
A form of malware or hardware that keeps track of and records your keystrokes as you type
Remote Access Trojan (RATs)
Installed as a backdoor
Malware use to gain complete control of operating system
Rootkit
Modifies files in the foundational building blocks of the operating system (the core)
Backdoor
A new way to get into system with out going through front door and as much security
Placed on system through malware
Virus
Malware that can reproduce itself
Executed by user when a program is run
Examples: program, boot sector, script, macro viruses