Chapter 2 Type of Attack Indicators Flashcards
Crypto-Malware
- Malware that uses a system’s resources to mine cryptocurrency.
- Theft of services attack uses CPU cycles of someone else’s computer to do crypto mining.
How are Trojans used to attack a system?
- A standalone program that must be copied and installed by an authorized user.
- Appears to do one thing but hides some other functionality.
Worm
- Pieces of code that attempt to penetrate network and computer systems.
- This can survive on its own.
Logic Bomb
- A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload.
Ransomware
- Malware that typically encrypts files on a system and then leaves them unusable or temporarily until a ransom is paid.
Spyware
- Usually installed without the user’s knowledge.
- Can record activities such as keyloggers.
Spraying
- An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts.
Potentially Unwanted Programs (PUP)
A way for companies and antivirus vendors to identify programs that may have adverse effects on a computer’s security or privacy.
Fileless Virus
- Memory-based attack, hard to detect.
- A piece of malware operates only in memory, never touches the filesystem.
Backdoor
- Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system.
- Common backdoors include: Netbus and Back Orifice.
Man in the Middle Attack
A mechanism whereby an attacker can inject himself into middle of a conversation between two devices.
Command and Control
- Used to control malware that has been launched against targets.
Rainbow Tables
Precomputed tables or hash values associated with passwords.
Dictionary
Another method of determining passwords is to use a password-cracking program that uses a list of dictionary words to try to guess the password.
Hybrid Cloud
- One where elements from private, public, and community cloud structures are combined.
- Environments not joined together but are used together.
Remote Access Trojans (RATs)
A toolkit designed to provide the capability of court surveillance and/or the capability to gain unauthorized access to a target system.
Bots
- A functioning piece of software that performs some task, under the control of another program.
- Bots can proliferate spam to commit fraud, install spyware, and other malicious acts.
Keyloggers
- Piece of software that logs all of the keystrokes that a user enters.
- Used to obtain passwords and other sensitive pieces of information.
Rootkit
- Specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality.
Brute Force
- Attempting all password combinations
- The length of the password can affect the time a brute force attack will take.
Offline Brute Force Attack
- Can be employed to perform hash comparisons against a stolen password file.
Online Brute Force Attacks
- Can occur against a system in real time.
- Frequently done to attack a single account with multiple examples of passwords.
Malicious Universal Serial Bus (USB) Cable
- Cables embedded with malicious devices such as Wi-Fi devices, enabling attacks against a Wi Fi network.
Skimming
- Physical devices built to collect all credit card information as well as the pin number being entered.
Adversarial Artificial Intelligence (AI)
- The use of complex models to simulate functions of the brain.
- Can be used to enable attacks such as phishing to avoid machine detection.
Tainted Training Data for Machine Learning (ML)
- A deficient training set of data can build a model with holes in it which can allow conditions to go undetected.
Security of Machine Learning Algorithms
- Should an attacker be able to reproduce the same set of parameters that could slip past the ML algorithm.
Supply-Chain Attacks
- The parts and software used to create networks can be tainted which can result in the final product can have vulnerabilities.
Cloud-Based vs On-Premise Attacks
- You must define the desired security and the methods of attaining it no matter if the system is cloud-based or in-house.`
Cryptographic Attacks
- An attack against a cryptographic system.
- Algorithmic weakness that can be exploited
Malicious Flash Drive
Malicious USB storage devices have been used to dupe users into plugging these devices into their computers and access sensitive information
Card Cloning
Getting the physical possession of and cloning the information on the card to gain access to sensitive information.
Birthday Paradox
The chance that two individuals within a group of at least 23 people share the same birthday.
Collision Attack
- Two different inputs yield the same output of a hash function.
- An attacker has a chance to create a file with changed visible content but identical hashes.
Downgrade Attack
- The attacker takes advantage of a commonly employed principle to support backward compatibility.