Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks Flashcards
What is a threat actor?
An attacker - anyone who launches a cyberattack on others
What is open-source intelligence?
Any information that is available via web sites and social media
How do attackers exploit open-source intelligence?
They use the information to gather intel and strategize their attack
A ____ ____ is an attacker who uses existing computer scripts or code to launch attacks.
Script kiddie
A _____ launches attacks as part of an activist movement or to further a cause
Hactivist
An _____ is anyone who has legitimate access to an organization’s internal resources.
Insider
What are some common security issues caused by insider threats?
Loss of confidentiality, integrity, and availability of an organization’s assets
True or False: Competitors can also engage in attacks
True
What does APT stand for and what is it?
Advanced Persistent Threat
A targeted attack against a network. Often sponsored by governments
What does DoS stand for and what is it?
Denial of Service
From one attacker against one target
What does DDoS stand for and what is it?
Distributed Denial of Service
From two or more attackers against a single target
What is the difference between DoS and DDoS?
DoS is a single attacker to a single target. DDoS is two or more attackers/computers to a single target
_____ attacks often include sustained, abnormally high network traffic on the network interface card of the attacked computer
DDoS
_____ and _____ attacks often attempt to overload an application or service on a computer.
DoS DDoS
A ____ is a malicous code that attaches itself to a host application.
Virus
Note: The host application must be executed to run, and the malicious code executes when the host application is executed
True or False: A virus does not try to replicate by finding other host applications to infect with the malicious code
False
A ____ is a self-replicating malware that travels throughout a network without assistance of a host application or user interaction.
Worm
A ___ resides in memory and can use different transport protocols to travel over the network
Worm
True or False: Worms do not consume significant bandwidth
False
____ can replicate themselves hundreds of times and spread to all the systems in the network.
Worms
What are some types of malware?
- Trojans
- Viruses
- Worms
- Rootkits
- Ransomware
- Spyware
- Logic bombs
A ____ is a string of code embedded into an application or script that will execute in response to an event.
Logic bomb
A ____ provides another way of accessing a system
Backdoor
Malware often installs _____ on systems to bypass normal authentication methods.
Backdoors