Cyber Attacks Flashcards

1
Q

Types of Attackers - Amateurs (Script Kiddies)

A

Explanation: Script kiddies, or amateurs, are inexperienced hackers using existing tools or instructions from the internet to launch attacks. Their motives vary from curiosity to causing harm, and although they use basic tools, their attacks can still have significant consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Attackers - Hackers

A

Explanation: Hackers break into computer systems or networks to gain access. Depending on their intent, they can be classified as white hat (ethical), gray hat (ambiguous), or black hat (malicious) hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

White Hat Hackers

A

Explanation: White hat attackers identify system weaknesses with permission, aiming to improve security. They report findings to the system owner and operate with ethical intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gray Hat Hackers

A

Explanation: Gray hat attackers seek vulnerabilities, reporting findings to system owners only if aligned with their agenda. They may publish details publicly, leaving room for ethical ambiguity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black Hat Hackers

A

Explanation: Black hat attackers exploit vulnerabilities for illegal personal, financial, or political gain, engaging in malicious activities without ethical considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organized Hackers

A

Explanation: Organized hackers comprise cyber criminal organizations, hacktivists, terrorists, and state-sponsored hackers. They are sophisticated, well-organized, and may provide cybercrime services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacktivists

A

Explanation: Hacktivists engage in hacking for political statements, aiming to raise awareness about important issues aligned with their beliefs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State-Sponsored Attackers

A

Explanation: State-sponsored attackers work on behalf of a government, gathering intelligence or conducting sabotage. They are highly trained, well-funded, and focus on specific government goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internal Threats - Mishandling Confidential Data

A

Explanation: Internal threats may involve mishandling confidential data within the organization, potentially compromising sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internal Threats - USB Media Connections

A

Explanation: Internal individuals may facilitate outside attacks by connecting infected USB media to the organization’s computer system, introducing potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal Threats - Clicking on Malicious Emails or Websites

A

Explanation: Internal threats can invite malware onto the organization’s network by clicking on malicious emails or websites, posing risks to the network’s integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internal Threats - Threatening Network Infrastructure

A

Explanation: Internal individuals may pose a threat by jeopardizing the operations of internal servers or network infrastructure devices, potentially disrupting organizational functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

External Threats - Exploiting Network Vulnerabilities

A

Explanation: External threats involve exploiting vulnerabilities in the network, taking advantage of weaknesses to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

External Threats - Unauthorized Access to Computing Devices

A

Explanation: External attackers aim to gain unauthorized access to computing devices, attempting to infiltrate the organization’s systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

External Threats - Social Engineering for Unauthorized Access

A

Explanation: External threats may use social engineering techniques to gain unauthorized access to organizational data, manipulating individuals for illicit access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly