Chapter 6 Flashcards

Comparing Threats, Vulnerabilities , and Common Attacks

1
Q

Open-Source Intelligence

A

A method of gathering data using public sources, such as social media sites and news outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

An attacker with little expertise or sophistication

Script kiddies use existing scripts to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

An attacker who launches attacks as part of an activist movement or to further a cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider

A

An attacker who launches attacks from within an organization, typically as an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced persistent threat is a group that has both the capability and intent to launch sophisticated and targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS

A

Denial-of-service is an attack from a single source that attempts to disrupt the services provided by the attacked system

Compare with DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

Distributed denial -of-service is an attack on a system launched from multiple source intended to make a computer’s resources or services unavailable to users

DDoS attacks typically include sustained, abnormally high network traffic

Compare with DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource Exhaustion

A

The malicious result of many DoS and DDoS attacks

The attack overloads a computer’s resources (such as the processor and memory), resulting in service interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Malicious code that attaches itself to a host application

The host application must be executed to run, and the malicious code executes when the host application is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

Self-replacing malware that travels through a network

Worms do not need user interaction to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

A type of malware that executes in response to an event

The event might be a specific date or time, or a user action such as when a user launches a specific program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Malicious software

It includes a wide range of software that has malicious intent, such as viruses, worms, ransomware, rootkits, logic bombs, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backdoor

A

An alternate method of accessing a system

Malware often adds a backdoor into a system after it infects it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

Malware also known as a Trojan horse

A Trojan often looks useful, but is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RAT

A

Remote access Trojan

Malware that allows an attacker to take control of a system form a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

A type of malware used to extort money from individuals and organization

Ransomware typically encrypts the user’s data and demands a ransom before decryption the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Crypto-Malware

A

A type of ransomware that encrypt the user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Keylogger

A

Software or hardware used to capture a user’s keystrokes

Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spyware

A

Software installed on users’ systems without their awareness or consent

Its purpose is often to monitor the user’s computer and the user’s activity

20
Q

Bots

A

Software robots that function automatically

A botnet is a group of computers that are joined together

Attackers often use malware to join computers to a botnet, and then use the botnet to launch attacks

21
Q

Rootkit

A

A type of malware that has system-level access to a computer

Rootkits are often able to hide themselves from users and antivirus software

22
Q

Social Engineering

A

The practice of using social tactics to gain information

Social engineers attempt to gain information from people, or get people to do things they wouldn’t normally do

23
Q

Shoulder Surfing

A

The practice of looking over someone’s shoulder to obtain information, such as on a computer screen

A screen filter placed over a monitor helps reduce the success of shoulder surfing

24
Q

Screen Filter

A

A physical security device used to reduce visibility of a computer screen

Screen filters help prevent shoulder surfing

25
Q

Hoax

A

A message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist

26
Q

Tailgating

A

A social engineering attack where one person follows behind another person without using credentials

Mantraps help prevent tailgating

27
Q

Mantrap

A

A physical security mechanism designed to control access to a secure area

A mantrap prevents tailgating

28
Q

Dumpster Diving

A

The practice of searching through trash looking to gain information from discarded documents

Shredding or burning papers helps prevent the success of dumpster diving

29
Q

Watering Hole Attack

A

An attack method that infects web sites that a group is likely to trust and visit

30
Q

Spam

A

Unwanted or unsolicited email

Attackers often launch attacks using spam

31
Q

Phishing

A

The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link

32
Q

Domain Abuse Notice

A

Filler

33
Q

Spear phishing

A

A targeted form of phishing

Attackers often launch attacks using spam

34
Q

Whaling

A

A form of spear phishing that attempts to target high-level executives

When successful, attackers gain confidential company information that they might not be able to get anywhere else

35
Q

Privilege Escalation

A

The process of gaining elevated rights and permissions

Malware typically uses a variety of techniques to gain elevated privileges

36
Q

Spam Filter on Mail Gateways

A

Filler

37
Q

Anti-Malware Software on Mail Gateways

A

Filler

38
Q

All Systems

A

Filler

39
Q

Boundaries or Firewalls

A

Filler

40
Q

Antivirus

A

Software that protects systems from malware

Although it is called antivirus software, it protects against most malware, including viruses, Trojans, worms, and more

41
Q

DEP

A

Filler

42
Q

Spam Filter

A

Spam filter is a method of blocking unwanted email

By blocking email, it often blocks malware

43
Q

Zero-Day Vulnerability

A

A vulnerability or bug that is unknown to trusted sources but can be exploited by attackers

Zero-day attacks take advantage of zero-day vulnerabilities

44
Q

Impersonation

A

Filler

45
Q

Vishing

A

Filler