Cyber Attacks Flashcards

1
Q

is a malicious and deliberate attempt by an
individual or organization to breach the information system of
another individual or organization. Usually, the attacker seeks
some type of benefit from disrupting the victim’s network.

A

Cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the practice of sending fraudulent communications that
appear to come from a reputable source, usually through
email.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal is to steal sensitive data like credit card and login
information or to install malware on the victim’s machine.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is an increasingly common cyberthreat.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

also known as eavesdropping attacks, occur when attackers
insert themselves into a two-party transaction. Once the attackers
interrupt the traffic, they can filter and steal data.

A

Man-in –the-Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

floods systems, servers, or networks with traffic to exhaust
resources and bandwidth. As a result, the system is unable to
fulfill legitimate requests.

A

Denial-of-service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

occurs when an
attacker inserts malicious code into a server that uses SQL
and forces the server to reveal information it normally would
not.

A

Structured Query Language injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hits after a network vulnerability is
announced but before a patch or solution is implemented.

A

Zero-day Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While it can be useful for network troubleshooting and
bypassing restrictions, it can also be used by attackers to
conceal their activities and compromise systems.

A

DNS Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a specialized attack that involves getting someone else’s
computer to do the work of generating cryptocurrency for you
(a process called mining in crypto lingo).

A

Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

someone who uses a computer system to gain
unauthorized access to another system for data or who makes
another system unavailable.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To break into your business and steal bank details, money or
confidential data. They usually use these stolen resources for their
own gain, to sell on to the black market or to extort the target
business.

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A desire to help businesses, along with a passion for finding holes
in security networks.

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

has all the skills of a Black and a White Hat hacker.
The difference is, they don’t care about stealing from people, nor do they
particularly want to help people. Instead, they like to play with systems and
enjoy the challenge of finding gaps, breaking protections and generally just
find hacking fun.

A

Grey Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

often take existing code for malware and
viruses they find online, then modify it to meet their needs. They will
use this code to target the business or individual they feel has
wronged them and inflict their revenge.

A

Blue Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To put a stop to people they know to be Black Hat hackers. But they
are downright scary in how they go about it. They essentially take the Black
Hat’s arsenal and turn it back against them. Using malware, DoS attacks,
viruses and Trojan Horses to destroy their machines from the inside out. It’s
a pretty effective way of stopping them from attacking anyone else!

A

Red Hat

17
Q

They are
new to the world of scripting, coding and hacking in general, so
you probably won’t find one attacking. Instead, they hang
around online message boards asking questions of more
developed hackers, honing their skills

A

Green Hat

18
Q

have no interest in things as mundane as theft. Or, as it turns out,
script. They don’t tend to develop their own software – instead they download existing
malware development software and watch videos on how to use it. When they’re
confident, they’ll attack.

A

Script Kiddies