Chapter 6: Comparing Threats, Vulnerabilities, and Common Attacks Flashcards
_____ _____ use existing computer scripts or code to launch attacks. They typically have very little expertise or sophistication, and very little funding.
Script kiddies
A_____ launches attacks as part of an activist movement or to further a cause.
hacktivist
_____(such as employees of a company) have legitimate access to an organization’s internal resources. They sometimes become malicious out of greed or revenge.
Insiders
Competitors sometimes engage in attacks to gain _____ _____ about another company.
proprietary information
Organized crime is an enterprise that employs a group of
individuals working together in criminal activities. Their primary motivation is _____.
money
Some attackers are organized and sponsored by a _____-_____ or government.
nation-state
An ____ ____ ____ is a targeted attack against a network. It has both the capability and intent to launch sophisticated and targeted attacks. They are sponsored by a nation-state and often have a significant amount of resources and funding.
advanced persistent threat (APT)
A common method attackers often use before launching an attack is to gather information from ___-____ _____, including any information available via web sites and social media.
open-source intelligence
_____includes several different types of malicious code, including viruses, worms, logic bombs, backdoors, Trojans, ransomware, rootkits, and more.
Malware
A_____ is malicious code that attaches itself to a host application. The code runs when the application is launched.
virus
A_____ is self-replicating malware that travels throughout a network without user intervention.
worm
A _____ _____ executes in response to an event, such as a day, time, or condition. Malicious insiders have planted logic bombs into existing systems, and these logic bombs have delivered their payload after the employee left the company.
logic bomb
_____provide another way of accessing a system. Malware often inserts this into systems, giving attackers remote access to systems.
Backdoors
A _____ appears to be one thing, such as pirated software or free antivirus software, but is something malicious. s.
Trojan
A ____ ____ ____ is a type of malware that allows attackers to take control of systems from remote location
remote access Trojan (RAT)
Drive-by downloads often attempt to infect systems with _____.
Trojans