Cyber Attacks Flashcards

1
Q

A set of rules and protocols that allow different software applications to communicate with each other. This interface defines the methods and data structures that programs can use to request services from other software components.

A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The means by which a user interacts with a computer system, software, or hardware. It includes visual elements like buttons, icons, and menus, as well as how users input commands.

The touchscreen interface on a smartphone, where users tap icons to open apps.

A

UI (User Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software that allows an operating system to communicate with hardware devices (like printers, video cards, or network adapters). Device drivers translate OS commands into device-specific operations.

Installing a printer driver to enable a computer to print documents.

A

Device Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of software development tools, libraries, and documentation that developers use to create applications for a specific platform or framework.

A mobile app developer uses this to build Android apps

A

SDK (Software Development Kit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyberattack in which the attacker floods a target system, network, or website with a massive amount of traffic or requests to overwhelm its resources, causing it to become slow, unavailable, or crash.

An attacker sends excessive traffic to a company’s website, causing it to slow down or go offline.

A

DoS Attack (Denial of Service Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when a program or application allocates memory but fails to release it when it is no longer needed, eventually causing the system to run out of memory.

A developer forgets to release memory after using it in an application.

A

Memory Leak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Happens when more data is written to a buffer (temporary data storage) than it can handle, causing the excess data to overwrite adjacent memory. This can lead to system crashes or security vulnerabilities.

A program tries to store more data in a fixed-size array, causing it to overwrite adjacent memory and crash.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Occurs when multiple processes or threads attempt to access or modify shared resources simultaneously, leading to unpredictable results or errors.

Two users simultaneously attempt to withdraw money from the same bank account, causing the account balance to become inaccurate.

A

Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Occurs when a number exceeds the maximum value that can be stored in a variable or data type, causing the value to wrap around and produce unexpected or incorrect results.

A program tries to add two large numbers, causing the result to exceed the limit of the variable’s data type and wrap around to a negative number.

A

Integer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of attack where the attacker systematically tries all possible combinations of passwords or encryption keys until the correct one is found.

An attacker tries every possible password for a user’s account until they find the correct one.

A

Brute-force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occurs when an attacker forces a system or communication to use a weaker or less secure version of a protocol, making it easier to exploit vulnerabilities.

An attacker forces a website to use outdated SSL/TLS encryption instead of the latest.

A

Downgrade Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Involves compromising a website or online resource that is frequently visited by the target group, in order to infect their devices with malware or steal sensitive data.

An attacker compromises a website that is popular among government employees,

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when an attacker intercepts or alters communications between two parties without them knowing, typically to steal or manipulate data.

An attacker intercepts the communication between a user and a banking website

A

On-path Attack (formerly known as Man-in-the-Middle Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves inserting a small piece of code (a “shim”) between two software components to modify or intercept their behavior, often to achieve compatibility or fix a problem.

An attacker may use this to insert malicious code into an application, altering its behavior without the user’s knowledge.

A

Shimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of restructuring existing code without changing its external behavior, typically to improve readability, maintainability, or performance.

A developer refactors a large, complicated function into smaller, more manageable functions to improve code clarity.

A

Refactoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A request made by a software program to an API to retrieve or send data, perform a specific function, or interact with a service or system.

A weather app does this to a weather service to retrieve current weather data.

A

API Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of installing applications or software from sources other than official app stores or marketplaces, often bypassing security mechanisms.

Installing an APK file directly from a website onto an Android device instead of downloading it from the Google Play Store.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Involves adding data to the beginning of a message or input, often to manipulate how the data is processed or interpreted by a system. This technique is often used in attacks to alter the behavior of a program.

In a phishing attack, an attacker prepends a malicious URL to a seemingly safe link to trick a user into clicking on it.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technique used to find security vulnerabilities by inputting random, unexpected, or invalid data into a program to see how it behaves and identify weaknesses.

A security researcher uses this testing method to find crashes or memory leaks in a web application by feeding it random or malformed inputs.

A

Fuzz Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An attack where an attacker intercepts and possibly alters communication between two parties without their knowledge. The attacker can eavesdrop, manipulate data, or impersonate one of the parties.

Example: An attacker intercepting traffic between a user and a website to steal login credentials.

A

MitM - Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A long-term, targeted attack by a well-resourced adversary, often a nation-state or organized group, aimed at stealing sensitive information or gaining unauthorized access over a prolonged period.

Example: A hacker group infiltrating a corporate network to steal trade secrets over several months.

A

APT - Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An attack where a malicious user tricks a victim into performing unwanted actions on a trusted website where the victim is authenticated, often leading to unauthorized actions like transferring funds or changing settings.

Example: A user unknowingly clicking a link that triggers a fund transfer from their bank account while logged in.

A

XSRF - Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An attack where multiple systems are used to flood a target system, server, or network with excessive traffic to exhaust resources and make the system unavailable to legitimate users.

Example: A large-scale botnet sending massive traffic to a website, causing it to crash and become inaccessible.

A

DDoS - Distributed Denial-of-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The total sum of all points where an attacker can potentially exploit a system to gain unauthorized access or cause damage. This includes hardware, software, network interfaces, and user interactions.

Example: may include exposed APIs, web server ports, authentication systems, and vulnerable third-party libraries.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An attack where an attacker disguises themselves as a trusted entity to gain unauthorized access, deceive users, or bypass security measures.

Example: An attacker sending an email that appears to come from a trusted source (like a bank) to trick a user into providing login credentials.

A

Spoofing

26
Q

A form of social engineering where attackers send fraudulent messages, often appearing as legitimate sources, to steal sensitive information such as usernames, passwords, or financial details.

Example: A fake email from a bank asking users to click a link and update their account information.

A

Phishing

27
Q

A type of attack where a hacker compromises a legitimate business email account and uses it to manipulate employees into performing unauthorized actions, such as transferring money or sending sensitive information.

Example: An attacker posing as a CEO sends an email to the finance department, instructing them to wire money to a fraudulent account.

A

BEC Attacks

28
Q

Links embedded in emails, websites, or messages that redirect users to phishing sites or trigger the download of malware.

Example: A link in a spam email that leads to a website designed to steal login credentials or install malware.

A

Malicious Links

29
Q

Files attached to emails or other messages that contain harmful software designed to infect and damage systems, steal data, or gain unauthorized access.

Example: An email with an attached document that, when opened, installs ransomware on the user’s computer.

A

Malware Attachements

30
Q

A type of attack where a user sends unsolicited messages via Bluetooth to nearby devices, often for pranking or spamming.

Example: Sending a random message to someone else’s Bluetooth-enabled phone without their consent.

A

Bluejacking

31
Q

An attack that involves accessing and stealing data from a Bluetooth-enabled device without the user’s consent.

Example: An attacker connecting to a phone’s Bluetooth to steal contacts, calendars, or other sensitive information.

A

Bluesnarfing

32
Q

A type of Wi-Fi attack where a rogue access point masquerades as a legitimate one, tricking users into connecting to it and potentially intercepting their data or injecting malicious content.

Example: An attacker sets up a Wi-Fi network with a name identical to a nearby coffee shop’s network to steal user credentials.

A

Evil Twin

33
Q

A type of phishing attack that targets high-level executives or important figures within an organization, often using highly personalized and sophisticated tactics to deceive them into divulging sensitive information or authorizing fraudulent transactions.

Example: An attacker impersonates a CEO and sends an email to the CFO requesting a large financial transfer.

A

Whaling

34
Q

A targeted form of phishing where the attacker customizes their fraudulent communications to a specific individual or organization, often using information gathered from social media or other sources to appear legitimate.

Example: An attacker gathers details about an employee from social media and sends a personalized email that looks like it’s from the IT department, asking the employee to reset their password.

A

Spear Phishing

35
Q

A type of social engineering attack that uses voice communication (typically phone calls) to trick individuals into revealing sensitive information or performing actions that benefit the attacker.

Example: An attacker calls a victim, pretending to be from their bank, and asks them to verify personal information over the phone.

A

Vishing

36
Q

A form of phishing that uses SMS (text messages) to lure individuals into clicking malicious links or providing personal information, often leading to identity theft or malware installation.

Example: A text message claiming to be from a bank, asking the recipient to click a link to “verify their account,” which leads to a phishing website.

A

Smishing

37
Q

A cyberattack where the attacker redirects legitimate website traffic to fraudulent websites, often by manipulating DNS settings or infecting users’ computers, to steal sensitive information like login credentials or personal data.

Example: A user tries to visit their bank’s website, but the DNS has been altered, redirecting them to a fake website that looks identical, where their login details are stolen.

A

Pharming

38
Q

An attack where an attacker alters the DNS settings of a user’s device or a DNS server to redirect traffic to malicious websites, often for phishing, data theft, or spreading malware.

Example: An attacker compromises a router’s DNS settings to redirect users to a fake banking website.

A

Domain Name System (DNS) Hijacking

39
Q

An attack where corrupt DNS data is injected into the cache of a DNS resolver, causing it to resolve domain names to incorrect IP addresses, often redirecting users to malicious sites.

Example: A DNS cache is poisoned, causing users to be redirected to a fake e-commerce website that collects their credit card information.

A

Domain Name System (DNS) Poisoining

40
Q

An attack that involves sending falsified ARP (Address Resolution Protocol) messages to a local network, mapping the attacker’s MAC address to the IP address of another device, allowing them to intercept or alter network traffic.

Example: An attacker uses this to intercept the communication between a user’s device and the router, allowing them to eavesdrop on sensitive information.

A

Address Resolution Protocol (ARP) Poisoning

41
Q

The practice of hiding data within other non-suspicious data, such as embedding a secret message in an image, audio, or video file, to avoid detection.

Example: An attacker hides malicious code inside an image file, which when opened, activates a virus or backdoor.

A

Steganography

42
Q

Attack methods that use images (e.g., hidden malicious code embedded in image files) as a means to deliver or execute threats, such as malware or exploits.

Example: An attacker embeds a malicious payload in an image file, which is executed when the image is processed by vulnerable software.

A

Image-Based Threat Vectors

43
Q

Attack methods that use files, such as documents or executable files, to deliver malware or exploit vulnerabilities in a system.

Example: An attacker sends a PDF file with an embedded macro that, when opened, installs ransomware on the target system.

A

File-Based Threat Vectors

44
Q

The unauthorized transfer of data from a system to an external location or attacker-controlled destination, often to steal sensitive information.

Example: A hacker extracts confidential company files and sends them to an external server via email or FTP.

A

Data Exfiltration

45
Q

A social engineering attack where an attacker creates a fabricated scenario (pretext) to obtain sensitive information or gain unauthorized access, often by impersonating someone trusted.

Example: An attacker pretends to be from the IT department and calls an employee to ask for their username and password to “fix a technical issue.”

A

Pretexting

46
Q

A method of attack where malicious software targets the client-side application or software on a user’s device, such as web browsers or email clients, to exploit vulnerabilities.

Example: A phishing email contains a malicious link that, when clicked in the browser, exploits a vulnerability to install malware on the user’s device.

A

Client-Based Software Threat Vector

47
Q

A threat method that involves a software agent (such as a monitoring or management agent) installed on a device, which can be exploited by attackers to control or access sensitive data on the system.

Example: An attacker exploits a vulnerability in an endpoint security agent to gain access to a network and execute commands remotely.

A

Agent-Based Threat Vector

48
Q

An attack where an attacker sends false ARP (Address Resolution Protocol) messages onto a local network, associating their MAC address with the IP address of another device, such as the gateway. This allows them to intercept or alter network traffic.

A

ARP Spoofing

49
Q

An attack where a malicious user sends frames to a different VLAN (Virtual Local Area Network) by exploiting misconfigurations in network switches, allowing them to bypass network segmentation and access restricted resources.

A

VLAN Hopping

50
Q

A physical attack where an attacker taps into a network cable to capture or alter the data being transmitted, often used in man-in-the-middle attacks.

A

Cable Tapping

51
Q

A technique used to capture and analyze network traffic passing through a specific port, typically to monitor, troubleshoot, or exploit vulnerabilities in network communication.

A

Port Sniffing

52
Q

A type of attack where malicious code is injected into the memory of a running process to alter its execution, often to perform unauthorized actions like code execution or data manipulation.

A

Memory Injection

53
Q

An attack where valid data transmissions (such as authentication tokens or messages) are captured and retransmitted (or “replayed”) by an attacker to gain unauthorized access or perform malicious actions.

Example: An attacker intercepts a legitimate login request and sends it again to access the system without needing to know the password.

A

Replay Attack

54
Q

A technique used in programming where a pointer (a variable that holds the memory address of another value) is used to access the value it points to. Improper dereferencing can lead to vulnerabilities, such as accessing uninitialized memory or causing a segmentation fault.

A

Pointer Deference

55
Q

A security flaw in software or hardware that is unknown to the vendor or the public, and for which no patch or fix is available, making it a target for exploitation by attackers.

Example: An attacker discovers a flaw in a popular web browser and exploits it before the vendor releases a security patch, allowing them to execute malicious code.

A

Zero-Day Vulnerability

56
Q

A technique used by attackers to inject malicious DLL files into a running process, allowing them to execute their own code within the context of that process. This can be used to manipulate the behavior of the program or escalate privileges.

A

DLL Injection

57
Q

A type of software error that occurs when multiple threads or processes attempt to access shared resources simultaneously, leading to inconsistent or unexpected behavior.

Example: Two threads attempt to update the same file at the same time, causing data corruption.

A

Concurrency Error

58
Q

A technique in programming where multiple threads (smaller units of a process) are executed concurrently within a single process. This allows for more efficient use of CPU resources, especially on multi-core processors.

A

Multithreading

59
Q

An error that occurs when there is a failure to properly synchronize access to shared resources between threads or processes, leading to race conditions, deadlocks, or inconsistent results.

A

Synchronization Error

60
Q

A type of concurrency error or vulnerability that occurs when a system checks the state of a resource (time-of-check) and then uses it later (time-of-use), but the resource’s state changes in between, leading to inconsistent or malicious behavior.

Example: An attacker changes a file’s permissions between the time it’s checked for access and the time it’s actually used, allowing unauthorized access.

A

TOC/TOU (Time-of-Check to Time-of-Use)