GCGA Ch. 6 Comparing Threats, Vulnerabilities, and Common Attacks Flashcards

1
Q

Nation-state attackers

A

attackers who are directly employed by or sponsored by a government. Their purpose is to advance that country’s interests using hacking tools. Unskilled attackers use existing computer scripts or code to launch attacks. They typically have very little expertise or sophistication and very little funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacktivist

A

launches attacks as part of an activist movement or to further a cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insiders

A

have legitimate access to an organization’s internal resources. They sometimes become malicious insiders out of greed or revenge. DLP solutions can prevent users from writing data to external media devices. Organized crime is an enterprise that employs a group of individuals working together in criminal activities. Their primary motivation is money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shadow IT

A

refers to unauthorized systems or applications used in an organization without authorization or approval. Threat actors vary in their attributes. They may be internal or external to the target organization and they have differing levels of resources/funding and level of sophistication/capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motivations of threat actors

A

Threat actors also have very different motivations. Some common attack motivations include data exfiltration, espionage, service disruption, blackmail, financial gain, philosophical or political beliefs, ethical hacking, revenge, disruption or chaos, and war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSINT

A

Cybersecurity professionals and attackers use open source intelligence (OSINT) sources to learn about vulnerabilities, how attackers exploit them, and how organizations can protect against the threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware types

A

include several different types of malicious code, including ransomware, Trojans, worms, spyware, bloatware, viruses, keyloggers, logic bombs, and rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

a type of malware that takes control of a user’s system or data. Criminals demand a ransom payment before returning control of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan

A

appears to be one thing, such as pirated software or free antivirus software, but is something malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

A remote access Trojan (RAT) is a type of malware that allows attackers to take control of systems from remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

self-replicating malware that travels throughout a network without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

software installed on user systems without the user’s knowledge or consent and it monitors the user’s activities. It sometimes includes a keylogger that records user keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bloatware

A

software installed when a user installs another program, often without the user’s knowledge. Some bloatware changes the default home page of a user’s browser or change the default search engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

malicious code that attaches itself to a host application. The code runs and replicates to other systems when the application is launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware or software keyloggers

A

track all of the keyboard activity on a system and report it back to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Logic bomb

A

executes in response to an event, such as a day, time, or condition. Malicious insiders have planted logic bombs into existing systems, and these logic bombs have delivered their payload after the employee left the company.

17
Q

Rootkits

A

take root-level or kernel-level control of a system. They hide their processes to avoid detection, and they can remove user privileges and modify system files.

18
Q

Social engineering

A

uses social tactics to gain information or trick users into performing actions they wouldn’t normally take. Social engineering attacks can occur in person, over the phone, while surfing the Internet, and via email. Many social engineers attempt to impersonate others.Social engineers and other criminals employ several psychology-based principles to help increase the effectiveness of their attacks. They are authority, intimidation, consensus, scarcity, urgency, familiarity, and trust.

19
Q

Shoulder surfing

A

an attempt to gain unauthorized information through casual observation, such as looking over someone’s shoulder, or monitoring screens with a camera. Screen filters can thwart shoulder surfing attempts. Social engineers use pretexting by presenting a fake scenario before asking for information.

20
Q

Hoax

A

a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.

21
Q

Tailgating

A

the practice of one person following closely behind another without showing credentials. Access control vestibules (sometimes called mantraps) help prevent tailgating.

22
Q

Dumpster divers

A

search through trash looking for information. Shredding or burning documents reduces the risks associated with dumpster diving.

23
Q

Watering hole attacks

A

discover sites that a targeted group visits and trusts. Attackers then modify these sites to download malware. When the targeted group visits the modified site, they are more likely to download and install infected files.

24
Q

Spam

A

unwanted or unsolicited email. Attackers often use spam in different types of attacks.

25
Phishing
the practice of sending email to users to trick them into revealing sensitive information, installing malware, or clicking on a link.
26
Spear phishing and whaling
types of phishing. Spear phishing targets specific groups of users, and whaling targets high-level executives.
27
Vishing
a form of phishing that uses voice over the telephone and often uses Voice over IP (VoIP). Some vishing attacks start with a recorded voice and then switch over to a live person.
28
Anti-spam software
attempts to block unsolicited email. You can configure a spam filter to block individual email addresses and email domains.
29
Antivirus software
can detect and block different malware types, such as worms, viruses, and Trojans. Antivirus software uses signatures to detect known malware and heuristics to detect potential malware based on behavior. When downloading signatures manually, hashes can verify the integrity of signature files. Antivirus software typically includes a file integrity checker to detect files modified by a rootkit.