Domain 1.0: Attacks, Threats, and Vulnerabilities Flashcards
Virus
Malicious computer program, infect systems and spread copies of themselves.
Worms
Similiar to virus, does not require host to replicate
Trojan
Disguised malicious code within useful application
Logic bombs
Trigger on a particular condition
Rootkits
Installed and hidden on a computer mainly for the purpose of compromising the system
Ransonware
Encrypts the disk using crypto-malware and demand the ransom payment to provide decryption to release the data.
Spyware
Monitors browser & OS activity. Logs keystrokes and may impact computer performance.
What can cause a computer to run slowly and generate pop-up advertisement?
Spyware and adware
Armored virus
Armored viruses use special tricks to make the tracing, disassembling, and understanding of their code more difficult.
Phishing
Social Engineering attack done mainly through email across a large audience
Spear Phishing
Social engineering attack via email that aims an individual, or a group of individuals
Whaling
Same as spear phishing, but with big or high-value targets such as CEO.
Vishing
This is the term for voice phishing. Often uses fake caller ID to appear as trusted organization and attempt to get the individual to enter account details via the phone.
Pharming
Based on farming and phishing. It does not require user to be tricked into clicking on a link. Instead, it redirects victims to a bogus website, even if they correctly entered the intended site.
DoS and DDoS
DoS - Denial of Service. DDoS - Distributed Denial of Service.
They involve disruption of normal network service and include attacks based on the ICMP echo reply called Smurf attacks.
Spoofing
Process of making data look as if it came from a trusted or legitimate origin.
On-path attack
A third system intercepts traffic between two systems by pretending to be the other system
Replay attacks
Reposting captured data
Zero-day vulnerability
Not detected by the antimalware software yet. No patches exist for them too.
What includes repeated guessing of logons and passwords?
Password guessing, brute-force and dictionary attacks.
Dictionary attacks
A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password
DNS poisoning
Redirect traffic by changing the IP record for a specific domain