CYBRSCRTY-MODULE 3 Flashcards
adversarial artificial intelligence
Exploiting the risks associated with using AI and ML in cybersecurity
Application Program Interface (API) attack
An attack that targets vulnerabilities in an API
backdoor
Malware that gives access to a computer, program, or service that circumvents any normal security protections
bot
An infected computer placed under the remote control of an attacker for the purpose of launching attacks
buffer overflow attack
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer
Client-side request forgery
An attack that takes advantage of an authentication “token” that a website sends to a user’s web browser to imitate the identity and privileges of the victim
command and control (C&C)
A structure that sends instructions to infected bot computers
Cross-site request forgery (CSRF)
Another term for “Client-Side Request Forgery”
Cross-site scripting (XSS)
An attack that takes advantage of a website that accepts user input without validating it
Cryptomalware
Malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid
device driver manipulation
An attack that alters a device driver from its normal function
DLL injection
An attack that inserts code into a running process through a DLL to cause a program to function in a different way than intended
error handling
A programming error that does not properly trap an error condition
eXtensible Markup Language (XML)
A markup language designed to store information
fileless virus
A type of malware that takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks
improper input handling
A programming error that does not filter or validate user input to prevent a malicious action
injections
Attacks that introduce new input to exploit a vulnerability
integer overflow attack
An attack that changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow
keylogger
Hardware or software that silently captures and stores each keystroke that a user types on the computer’s keyboard
logic bomb
Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
malware
Malicious software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and harmful action
memory leak
A situation that occurs when, due to a programming error, memory is not freed when the program has finished using it
pointer/object dereference
A flaw that results in a pointer given a NULL instead of valid value
Potentially Unwanted Program (PUP)
Software that users do not want on their computer