Chapter 2 Type of Attack Indicators Flashcards

1
Q

Crypto-Malware

A
  • Malware that uses a system’s resources to mine cryptocurrency.
  • Theft of services attack uses CPU cycles of someone else’s computer to do crypto mining.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are Trojans used to attack a system?

A
  • A standalone program that must be copied and installed by an authorized user.
  • Appears to do one thing but hides some other functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A
  • Pieces of code that attempt to penetrate network and computer systems.
  • This can survive on its own.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A
  • A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A
  • Malware that typically encrypts files on a system and then leaves them unusable or temporarily until a ransom is paid.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A
  • Usually installed without the user’s knowledge.
  • Can record activities such as keyloggers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spraying

A
  • An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Potentially Unwanted Programs (PUP)

A

A way for companies and antivirus vendors to identify programs that may have adverse effects on a computer’s security or privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless Virus

A
  • Memory-based attack, hard to detect.
  • A piece of malware operates only in memory, never touches the filesystem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor

A
  • Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system.
  • Common backdoors include: Netbus and Back Orifice.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man in the Middle Attack

A

A mechanism whereby an attacker can inject himself into middle of a conversation between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command and Control

A
  • Used to control malware that has been launched against targets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rainbow Tables

A

Precomputed tables or hash values associated with passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dictionary

A

Another method of determining passwords is to use a password-cracking program that uses a list of dictionary words to try to guess the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid Cloud

A
  • One where elements from private, public, and community cloud structures are combined.
  • Environments not joined together but are used together.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access Trojans (RATs)

A

A toolkit designed to provide the capability of court surveillance and/or the capability to gain unauthorized access to a target system.

17
Q

Bots

A
  • A functioning piece of software that performs some task, under the control of another program.
  • Bots can proliferate spam to commit fraud, install spyware, and other malicious acts.
18
Q

Keyloggers

A
  • Piece of software that logs all of the keystrokes that a user enters.
  • Used to obtain passwords and other sensitive pieces of information.
19
Q

Rootkit

A
  • Specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality.
20
Q

Brute Force

A
  • Attempting all password combinations
  • The length of the password can affect the time a brute force attack will take.
21
Q

Offline Brute Force Attack

A
  • Can be employed to perform hash comparisons against a stolen password file.
22
Q

Online Brute Force Attacks

A
  • Can occur against a system in real time.
  • Frequently done to attack a single account with multiple examples of passwords.
22
Q

Malicious Universal Serial Bus (USB) Cable

A
  • Cables embedded with malicious devices such as Wi-Fi devices, enabling attacks against a Wi Fi network.
23
Q

Skimming

A
  • Physical devices built to collect all credit card information as well as the pin number being entered.
24
Q

Adversarial Artificial Intelligence (AI)

A
  • The use of complex models to simulate functions of the brain.
  • Can be used to enable attacks such as phishing to avoid machine detection.
25
Q

Tainted Training Data for Machine Learning (ML)

A
  • A deficient training set of data can build a model with holes in it which can allow conditions to go undetected.
26
Q

Security of Machine Learning Algorithms

A
  • Should an attacker be able to reproduce the same set of parameters that could slip past the ML algorithm.
27
Q

Supply-Chain Attacks

A
  • The parts and software used to create networks can be tainted which can result in the final product can have vulnerabilities.
27
Q

Cloud-Based vs On-Premise Attacks

A
  • You must define the desired security and the methods of attaining it no matter if the system is cloud-based or in-house.`
28
Q

Cryptographic Attacks

A
  • An attack against a cryptographic system.
  • Algorithmic weakness that can be exploited
29
Q

Malicious Flash Drive

A

Malicious USB storage devices have been used to dupe users into plugging these devices into their computers and access sensitive information

30
Q

Card Cloning

A

Getting the physical possession of and cloning the information on the card to gain access to sensitive information.

31
Q

Birthday Paradox

A

The chance that two individuals within a group of at least 23 people share the same birthday.

32
Q

Collision Attack

A
  • Two different inputs yield the same output of a hash function.
  • An attacker has a chance to create a file with changed visible content but identical hashes.
33
Q

Downgrade Attack

A
  • The attacker takes advantage of a commonly employed principle to support backward compatibility.