Chapter 6 Flashcards
Comparing Threats, Vulnerabilities , and Common Attacks
Open-Source Intelligence
A method of gathering data using public sources, such as social media sites and news outlets
Script Kiddie
An attacker with little expertise or sophistication
Script kiddies use existing scripts to launch attacks
Hacktivist
An attacker who launches attacks as part of an activist movement or to further a cause
Insider
An attacker who launches attacks from within an organization, typically as an employee
APT
Advanced persistent threat is a group that has both the capability and intent to launch sophisticated and targeted attacks
DoS
Denial-of-service is an attack from a single source that attempts to disrupt the services provided by the attacked system
Compare with DDoS
DDoS
Distributed denial -of-service is an attack on a system launched from multiple source intended to make a computer’s resources or services unavailable to users
DDoS attacks typically include sustained, abnormally high network traffic
Compare with DoS
Resource Exhaustion
The malicious result of many DoS and DDoS attacks
The attack overloads a computer’s resources (such as the processor and memory), resulting in service interruption
Virus
Malicious code that attaches itself to a host application
The host application must be executed to run, and the malicious code executes when the host application is executed
Worm
Self-replacing malware that travels through a network
Worms do not need user interaction to execute
Logic Bomb
A type of malware that executes in response to an event
The event might be a specific date or time, or a user action such as when a user launches a specific program
Malware
Malicious software
It includes a wide range of software that has malicious intent, such as viruses, worms, ransomware, rootkits, logic bombs, and more
Backdoor
An alternate method of accessing a system
Malware often adds a backdoor into a system after it infects it
Trojan
Malware also known as a Trojan horse
A Trojan often looks useful, but is malicious
RAT
Remote access Trojan
Malware that allows an attacker to take control of a system form a remote location
Ransomware
A type of malware used to extort money from individuals and organization
Ransomware typically encrypts the user’s data and demands a ransom before decryption the data
Crypto-Malware
A type of ransomware that encrypt the user’s data
Keylogger
Software or hardware used to capture a user’s keystrokes
Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker