Chapter 2 Type of Attack Indicators Flashcards
What does C.I.A stand for?
Confidentiality, Integrity, and Availability
What is Malware?
Software that has been designed for some nefarious purpose
What is Ransomware?
A form of malware that performs some action and extracts a ransom from the user
What are trojans?
A piece of software that appears to do one thing but hides some other functionality
What is a worm?
Pieces of code that attempt to penetrate networks and computer systems, once infiltrated the worm will copy itself on the system
What are potentially unwanted programs (PUP)?
Programs that may have adverse effects on a computer security or privacy
What are Fileless Viruses?
A piece of malware operating only in memory, never touching the filesystem
What is a bot
A functioning piece of software that performs some task, under the control of another program
What is a botnet?
A series of bots controlled across the network in a group
What is Crypto-malware?
Malware that uses a systems resources to mine cryptocurrency
What are Logic Bombs
A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload
What is Spyware?
Software that spies on users, recording and reporting on their activities
What is a Keylogger?
A piece of software that logs all of the keystrokes that a user enters
What are Remote Access Trojans (RATS)?
A toolkit designed to provide the capability of covert surveillance and or the capability to gain unauthorized access to a target system
What is a Rootkit
A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality
What are the five types of rootkits
firmware, virtual, kernel, library, and application level
What are Backdoors
Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system
What is Password Spraying?
An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts
what is a dictionary attack?
When an attacker uses a list of dictionary words to attempt to crack a password
What are Rainbow Tables?
Precomputed tables or hash values associated with passwords
What is a salt?
a random set of characters designed to increase the length of the item being hashed
What is Malicious Universal Serial Bus (USB) Cable?
A USB cable with embedded electronics in it
What is Card Cloning?
When a hacker copies the magnetic strip of a credit card and makes a clone of it
What are Skimming Devices?
Physical devices built to intercept a credit card
What is Adversarial A.I.
A.I. designed to perform malicious attacks and evade detection
What are cryptographic attacks?
Attacks against the cryptographic system
What is a Downgrade attack?
An attack to downgrade the security to a lower or nonexistent state