Methodes Of Attack Flashcards

1
Q

Malware

A

A software designed to harm device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

Example of: Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that self replicates, spreading across the network and infecting computers

Example of: Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organisations data and demand payment to restore access

Example of: Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Malicious software installed on a users computer without their permission, which is used to spy on and steel user data

Example of: Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear Phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

Example of: Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of a spear phishing during which threat actors target executors in order to gain access to sensitive data

Example of: Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business email compromise

A

BEC an attack in which a threat actor impersonate a known source to obtain a financial advantage

Example of: Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

Example of: phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

Manipulation technique that exploits human error to gain unauthorised access to sensitive, private, and/or valuable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social media phishing

A

An attack in which threat actor collects detailed information about their target on social media sites before initiating an attack

Example of: social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

Example of: social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical social engineering

A

An attack in which threat actor impersonate an employee, customer, or vendor to obtain unauthorised access to a physical location

Example of: social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB baiting

A

An attack in which a threat actor strategically leaves a Malware USB stick for an employee to find and unknowingly infected network

Example of: social engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly