Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks Flashcards
What is a threat actor?
An attacker - anyone who launches a cyberattack on others
What is open-source intelligence?
Any information that is available via web sites and social media
How do attackers exploit open-source intelligence?
They use the information to gather intel and strategize their attack
A ____ ____ is an attacker who uses existing computer scripts or code to launch attacks.
Script kiddie
A _____ launches attacks as part of an activist movement or to further a cause
Hactivist
An _____ is anyone who has legitimate access to an organization’s internal resources.
Insider
What are some common security issues caused by insider threats?
Loss of confidentiality, integrity, and availability of an organization’s assets
True or False: Competitors can also engage in attacks
True
What does APT stand for and what is it?
Advanced Persistent Threat
A targeted attack against a network. Often sponsored by governments
What does DoS stand for and what is it?
Denial of Service
From one attacker against one target
What does DDoS stand for and what is it?
Distributed Denial of Service
From two or more attackers against a single target
What is the difference between DoS and DDoS?
DoS is a single attacker to a single target. DDoS is two or more attackers/computers to a single target
_____ attacks often include sustained, abnormally high network traffic on the network interface card of the attacked computer
DDoS
_____ and _____ attacks often attempt to overload an application or service on a computer.
DoS DDoS
A ____ is a malicous code that attaches itself to a host application.
Virus
Note: The host application must be executed to run, and the malicious code executes when the host application is executed
True or False: A virus does not try to replicate by finding other host applications to infect with the malicious code
False
A ____ is a self-replicating malware that travels throughout a network without assistance of a host application or user interaction.
Worm
A ___ resides in memory and can use different transport protocols to travel over the network
Worm
True or False: Worms do not consume significant bandwidth
False
____ can replicate themselves hundreds of times and spread to all the systems in the network.
Worms
What are some types of malware?
- Trojans
- Viruses
- Worms
- Rootkits
- Ransomware
- Spyware
- Logic bombs
A ____ is a string of code embedded into an application or script that will execute in response to an event.
Logic bomb
A ____ provides another way of accessing a system
Backdoor
Malware often installs _____ on systems to bypass normal authentication methods.
Backdoors
A ____ looks like something beneficial, but it’s actually something malicious.
Trojan/Trojan horse
What are some forms that trojan horses can come in?
- Pirated software
- Useful utility software i.e. fake antivirus software
- Game
What is a drive by download?
When web services include malicious code that attempts to download and install itself on users computers after the user visits
_______ masquerades as a free antivirus porgram
Rogueware/scareware
What does RAT stand for and what is it?
Remote access trojan
A type of malware that allows attackers to take control of systems from remote locations; often delivered by drive-by downloads
True or False: Some RATs automatically collect and log keystrokes, usernames and passwords, incoming and outgoing email, chat sessions, and browser history as well as take screenshots.
True
____ is a type of Trojan
Ransomware
_____ is when attackers encrypt the user’s data or take control of the computer and lock out the user. They they demand that the user pay a ransom to regain access to the data or computer.
Ransomware
True or False: Many organizations indicate that ransomware attacks continue to grow and are becoming one of the greatest cyber threats
True
Ransomware that encrypts the user’s data is sometimes called ______
crypto-malware
_____ is when the user doesn’t pay the ransom to decrypt the files and the attacker threatens to publish the files along with the victim’s credentials.
Doxing
A ____ attempts to capture a user’s keystrokes.
Keylogger