Domain 1.0: Attacks, threats and vul. Flashcards
Programming errors can result in system compromise, allowing someone to gain unauthorized privileges. This is known as ________
privilege escalation
malware:
infect systems and spread copies of themselves
viruses
malware:
similar to viruses but do not require a host to replicate
worms
malware:
disguise malicious code within apparently useful applications
trojans
malware:
trigger on a particular condition
logic bombs
malware:
can be installed and hidden on a computer mainly for the purpose of compromising the system
rootkits
malware:
usually demands money in return for the release of data, which may have also been encrypted using crypto-malware
ransomware
malware:
may monitor browser activity and log keystrokes and may impact computer performance
spyware
______ and _______ often result in a computer running slowly and generating pop-ups.
spyware, adware
an ______ ______ seeks to make analysis difficult by including a metaphorical layer of armor around the virus
armored virus
__________ is a social engineering attack commonly done through email across a large audience
phishing
____ _______ is a social engineering attack commonly done through email that targets an individual or an individual group
spear phishing
_______ is similar to spear phishing but affects big targets, such as CEO
whaling
in ____, also known as voice phishing, the attacker often uses a fake caller ID to appear as a trusted organization and attempt to get the individual to enter account details via the phone.
to obtain private information over the phone
vishing
the term ________ is based on farming and phishing. It does not require the user to be tricked into clicking on a link. Instead, it redirects victims to a bogus website, even if they correctly entered the intended site
pharming
DoS and DDoS attacks involve disruption of normal network services and include attacks based on the ICMP (Internet control message protocol) echo reply called _______ _____
smurf attacks
______ is the process of making data look as if it came from a trusted or legitimate orgin
spoofing
with an ___-___ ____, a third system intercepts traffic between two systems by pretending to be the other system.
on-path attack
_____ _____ involve reposting captured data
replay attacks
____-___ vulnerabilities do not have patches yet and aren’t detected by antimalware software
zero-day