Determine type of attack via indicators Flashcards

1
Q

What is Malware

A

Software that does something bad. Overlap occurs within malware classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware

A

Malware that attempts to extort money from victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Trojans

A

Malware concealed within an installer package for software that appears to be legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Worms

A

Memory-resident malware that can run without user intervention and replicate over network resources. It activates when something is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Potentially unwanted programs (PUPs)

A

Software installed alongside a package selected by the user or perhaps bundled with a new computer system. Also known as Greyware. Not malicious but you don’t want it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Fileless virus/Fileless malware

A

The virus itself is not written to the disk. Uses shellcode. Look up in more detail before the test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Command and control

A

An infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Bots

A

An automated script or tool that performs some malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cryptomalware

A

The crypto-malware class of ransomware attempts to encrypt data files on any fixed, removable, and network drives. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker. If successful, this sort of attack is extremely difficult to mitigate, unless the user has up to date backups of the encrypted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Logic bombs

A

A trap that activates when a condition is met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Spyware

A

Malware that can perform adware-like tracking, but also monitor local application activity, take screenshots, and activate recording devices, such as a microphone or webcam. Another spyware technique is perform DNS redirection to pharming sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Keyloggers

A

Spyware that actively attempts to steal confidential information by recording keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Remote access Trojan (RAT)

A

Backdoor malware that mimics the functionality of legitimate remote control programs, but is designed specifically to operate covertly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What isRootkit

A

Malware running with System level privileges is referred to as a rootkit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Backdoor

A

Any type of access method to a host that circumvents the usual authentication method and gives the remote user administrative control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Password attacks

A

A broad term covering attacks to capture passwords

17
Q

What is Spraying

A

Trying multiple common passwords.

18
Q

What is Dictionary

A

Uses a list or dictionary to generate possible passwords

19
Q

What is Brute force

A

Tries every possible combination within the size.

20
Q

What is Offline attack

A

An attack that does not interact with the authentication protocol directly. Hacked database of passwords or might interact with user computers to get data to launch another attack to figure out passwords.

21
Q

What is Online attack

A

An attack wherein the attacker interacts with authentication service directly.

22
Q

What is Rainbow tables

A

The attacker uses a precomputed lookup table of all possible passwords and their matching hashes.

23
Q

What is Plaintext/unencrypted

A

Its just written out and easy to steal.

24
Q

What is Physical attacks

A

An attack that occurs irl. A flashdrive left in a parking lot with malicious code.

25
Q

What is Malicious universal serial bus (USB) cable

A

A USB cable infected with malware or physically modified to imply malware.

26
Q

What is Malicious flash drive

A

A flash drive cable infected with malware or physically modified to imply malware.

27
Q

What is Card cloning

A

Making one or more copies of an existing card.

28
Q

What is Skimming

A

Using a counterfeit card reader to capture card details, which are then used to program a duplicate.

29
Q

What is Adversarial artificial intelligence (AI)

A

Using AI to identify vulnerabilities and attack vectors to circumvent security systems.

30
Q

What is Tainted training data for machine learning (ML)

A

An attacker inserting corrupt data in the training dataset to compromise a target machine learning model during training.

31
Q

What is Security of machine learning algorithms

A

Machine learning can be applied in various ways in security, for instance, in malware analysis, to make predictions, and for clustering security events. It can also be used to detect previously unknown attacks with no established signature.

32
Q

What is Supply-chain attacks

A

The goal is to access source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware.

33
Q

What is Cloud-based vs. on-premises attacks

A

Cloud-based services must be integrated within regular security policies and procedures and audited for compliance. Where indicators of on-premises attacks are found in local application logs and network traffic, indicators of cloud-based attacks are found in API logs and metrics.

34
Q

What is Cryptographic attacks

A

Circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.

35
Q

What is Birthday

A

a type of brute force attack aimed at exploiting collisions in hash functions.

36
Q

What is Collision

A

Where a function produces the same hash value for two different plaintexts.

37
Q

What is Downgrade

A

Used to facilitate a man-in-the-middle attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths. For example, rather than use TLS 1.3, as the server might prefer, the client requests the use of SSL.