Cyber Sec Exam Flashcards
Ransomware
Encrypts data then demands payment or information in order to receive it back
Keylogger
Tracks Keystrokes
Spyware
Monitors devices secretly and potential control of the device in places
Phishing
Steals information from people while pretending to be something else
Stealth Backdoor
Entering through intentional holes in the system left by attackers to secretly bypass security procedures
Rootkit
A set of programs installed on a system to maintain covert access to that
system with administrator (or root) privileges
Attack Agents
Take over another internet attached computer and use it to attack
Payload
The main action that the virus or malware is built to carry out
Clickjacking
Clickjacking is a malicious technique used by attackers to trick users into clicking on something different from what they perceive they are clicking on
Malvertising
Malware placed on websites without infecting them typically in advertisements.
Drive-by downloads
This type of attack typically occurs when a user visits a compromised or malicious website, and the malicious code is automatically downloaded and executed in the background. This exploits issues in the browser or OS.
Watering Hole attacks
A targeted form of a drive-by download
Trojan
Malware that disguises itself as a not malicious program
Worms
Seeks out other files while infecting as much as possible. Can spread through network connections and files based on the goal condition that is set for it.
Metamorphic virus
A virus that mutates and rewrites itself completely at each iteration and may change behavior as well as appearance.
Polymorphic virus
A virus that mutates with every infection
Stealth virus
A form of virus explicitly designed to hide itself from detection by anti-virus software.
Encrypted virus
A portion of the virus creates a random encryption key and encrypts the remainder of the virus
Virus
Infects software and modifies, replicates and spreads upon a condition being met. Examples such as logic bombs
Logic Bomb
A virus which activates upon certain conditions being met such as a date/time.
Attack Kit
Malware kits used to create malware. Examples such as Zeus and Angler
What is the difference between worms, viruses and Trojans?
how they spread
What is social engineering
“tricking” users to assist in the compromise of their own systems or personal
information. This can occur when a user views and responds to some SPAM
e-mail, or permits the installation and execution of some Trojan horse program or
scripting code. E.g trojans, spam
Brute Force
Guessing every individual combination of a password or key till the correct combination has been found