Module 2 Flashcards
Network Threats
What is Risk Management?
The process of identifying, prioritizing, managing, and monitoring risks to information systems
What are the common ways to manage risk?
Risk acceptance, risk reduction, and risk transfer
How is the term Hacker used?
To describe a threat actor
White hat hackers
Ethical hackers use their skills for good, ethical, and legal purposes
Grey hat hackers
Individuals who commit crimes and do unethical things, but not for personal gain or to cause damage
Black hat hackers
Criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks
What are the different types of threat actors?
Script kiddies, vulnerability brokers, hacktivists, cybercriminals, and state-sponsored hackers
How have attack tools developed?
They became more sophisticated and highly automated
What are some attack tools?
Password crackers, wireless hacking tools, network security scanning and hacking tools, packet crafting tools, packet sniffers, rootkit detectors, fuzzers to search vulnerabilities, forensic tools, debuggers, hacking operating systems, encryption tools, vulnerability exploration tools, and vulnerability scanners
What are the different categories of attacks?
eavesdropping attacks, data modification attacks, IP address spoofing attacks, password-based attacks, denial-of-service attacks, man-in-the-middle attacks, compromised key attacks, and sniffer attacks
Why do threat actors try to trick users into installing malware?
To help exploit end-device vulnerabilities
Antimalware software cannot be updated quickly enough to stop new threats. (T/F)
True
What are the three common types of malware?
Virus, worm, and Trojan horse
What is a virus?
A type of malware that spreads by inserting a copy of itself into another program
How do most viruses spread?
Through USB memory drives, CDs, DVDs, network shares, and email
What is a Trojan horse?
A software that appears to be legitimate, but it contains malicious code that exploits the privileges of the user that runs it
Where are Trojans often found?
In online games
How are Trojans classified?
According to the damage they cause
What are the different types of Trojans?
Remote-access, data-sending, destructive, proxy, FTP, security software, disabler, DoS, and keylogger
How are worms similar to viruses?
They replicate and can cause the same type of damage
What do Viruses need to run?
A host program
How do worms run?
They can run by themselves
What are the three components worm attacks consist of?
Enabling vulnerability, propagation mechanism, and payload
What is the most dominant malware currently?
Ransomware
How does ransomware work?
It denies access to the infected system or its data. The cybercriminals then demand payment to release the computer system