CYBRSCRTY-MODULE 3 Flashcards

1
Q

adversarial artificial intelligence

A

Exploiting the risks associated with using AI and ML in cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Program Interface (API) attack

A

An attack that targets vulnerabilities in an API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

backdoor

A

Malware that gives access to a computer, program, or service that circumvents any normal security protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

bot

A

An infected computer placed under the remote control of an attacker for the purpose of launching attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

buffer overflow attack

A

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client-side request forgery

A

An attack that takes advantage of an authentication “token” that a website sends to a user’s web browser to imitate the identity and privileges of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

command and control (C&C)

A

A structure that sends instructions to infected bot computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cross-site request forgery (CSRF)

A

Another term for “Client-Side Request Forgery”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cross-site scripting (XSS)

A

An attack that takes advantage of a website that accepts user input without validating it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptomalware

A

Malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

device driver manipulation

A

An attack that alters a device driver from its normal function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLL injection

A

An attack that inserts code into a running process through a DLL to cause a program to function in a different way than intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

error handling

A

A programming error that does not properly trap an error condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

eXtensible Markup Language (XML)

A

A markup language designed to store information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

fileless virus

A

A type of malware that takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

improper input handling

A

A programming error that does not filter or validate user input to prevent a malicious action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

injections

A

Attacks that introduce new input to exploit a vulnerability

18
Q

integer overflow attack

A

An attack that changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow

19
Q

keylogger

A

Hardware or software that silently captures and stores each keystroke that a user types on the computer’s keyboard

20
Q

logic bomb

A

Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it

21
Q

malware

A

Malicious software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and harmful action

22
Q

memory leak

A

A situation that occurs when, due to a programming error, memory is not freed when the program has finished using it

23
Q

pointer/object dereference

A

A flaw that results in a pointer given a NULL instead of valid value

24
Q

Potentially Unwanted Program (PUP)

A

Software that users do not want on their computer

25
race condition
A situation in software that occurs when two concurrent threads of execution access a shared resource simultaneously
26
ransomware
Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid
27
refactoring
Changing the design of existing code
28
remote access Trojan
Malware that infects a computer like a Trojan but also gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols
29
replay
An attack that copies data and then uses it for an attack
30
resource exhaustion attacks
An attack that depletes parts of memory and interferes with the normal operation of the program in RAM to give an attacker access to the underlying OS
31
rootkit
Malware that can hide its presence and the presence of other malware on the computer
32
security of the ML algorithms
A risk associated with the vulnerabilities in AI-powered cybersecurity applications and their devices
33
server-side request forgery (SSRF)
An attack that takes advantage of a trusting relationship between web servers
34
shimming
Transparently adding a small coding library that intercepts calls made by a device and changes the parameters passed between the device and the device driver
35
spyware
Tracking software that is deployed without the consent or control of the uesr
36
SQL injection
An attack that inserts statements to manipulate a database server using Structured Query Language (SQL) commands
37
Structured Query Language (SQL)
A language used to view and manipulate data that is stored in a relational database
38
tainted training data for machine learning
A risk associated with attackers can attempt to alter the training data that is used by ML
39
time of check/time of use
A software check of the state of a resource before using that resource
40
Trojan
An executable program that masquerades as performing a benign activity but also does something palicious
41
worm
Malicious program that uses a computer network to replicate
42
XML injection
An attack that inserts statements to manipulate a database server using eXtensible Markup Language (XML)