Network Threats and Attacks Flashcards

1
Q

Malicious software includes viruses, worms, Trojans, ransomware, and spyware that can infect systems, steal data, or disrupt operations.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and financial details) by impersonating a trusted entity via email or other communication channels.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Overwhelm a network or website with excessive traffic or requests, causing it to become unavailable.

A

Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker intercepts and possibly alters communication between two parties without their knowledge.

A

Man-in-the-Middle (MitM) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attackers insert malicious SQL queries into input fields to manipulate a database, potentially gaining unauthorized access to data.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Injecting malicious scripts into web pages viewed by other users, compromising their browsing experience or stealing their data.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or public, giving no time for patches.

A

Zero-Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes brute force attacks, dictionary attacks, and credential stuffing, aiming to gain unauthorized access by exploiting weak or stolen passwords.

A

Password Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious or negligent actions by employees or trusted individuals within an organization that can compromise security.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized devices (e.g., rogue access points) added to a network that can be used to eavesdrop or gain access.

A

Rogue Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized interception of network traffic to capture sensitive data.

A

Eavesdropping/Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Manipulating individuals into divulging confidential information or performing actions that compromise security.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious advertisements that can infect systems when clicked on.

A

Malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet of Things devices with security weaknesses that can be exploited by attackers.

A

IoT Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software is automatically downloaded and installed when a user visits a compromised website.

A

Drive-By Downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorized copying, transfer, or retrieval of data from an organization’s network.

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intercepting and analyzing data packets in transit to obtain sensitive information.

A

Packet Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Manipulating DNS records to redirect users to malicious websites or hijack their traffic.

A

DNS Spoofing/Cache Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Repeatedly trying all possible combinations of passwords or encryption keys until the correct one is found.

A

Brute Force Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scanning for and exploiting vulnerabilities in wireless networks.

A

Wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Illegally using a victim’s computer or network resources to mine cryptocurrency.

A

Cryptojacking

22
Q

Exploiting vulnerabilities in applications or scripts without writing malicious files to disk, making them harder to detect.

A

Fileless Attacks

23
Q

Long-term targeted attacks by well-funded and organized adversaries with the goal of stealing information or maintaining a persistent presence.

A

Advanced Persistent Threats (APTs)

24
Q

Attackers compromise websites frequently visited by their target audience, infecting visitors with malware.

A

Watering Hole Attacks

25
Encrypting a victim's data and demanding a ransom for decryption keys.
Ransomware
26
Illegally acquiring usernames and passwords through various means, such as keyloggers or phishing, to gain unauthorized access.
Credential Theft
27
Also known as session fixation, attackers take control of a user's active session to impersonate them and perform malicious actions.
Session Hijacking
28
Attackers use DNS queries to create covert communication channels for data exfiltration or command and control.
DNS Tunneling
29
Malicious software that permanently damages or "bricks" a device, rendering it unusable.
BrickerBot (Permanent Denial-of-Service)
30
Hijacking a network of compromised devices to mine cryptocurrencies, consuming resources and slowing down systems.
Crypto-Mining Botnets
31
Exploiting insecure file upload functionality to execute malicious scripts or upload malware.
File Upload Vulnerabilities
32
Manipulating the Address Resolution Protocol to associate an attacker's MAC address with a legitimate IP address.
ARP Spoofing/Poisoning
33
Malware or malicious code introduced to a network through infected USB drives or devices.
USB-based Attacks
34
Impersonating high-level executives to trick employees into transferring money or sensitive information.
Business Email Compromise (BEC)
35
Cybercriminals can subscribe to ransomware services, making it easier for less technically skilled attackers to launch attacks.
Crypto Ransomware-as-a-Service (RaaS)
36
Redirecting website traffic to a fraudulent site using DNS manipulation or malware.
Pharming
37
Scammers use phone calls or VoIP to impersonate trusted entities and obtain sensitive information.
Vishing (Voice Phishing)
38
Fake systems or networks designed to attract attackers and study their tactics, techniques, and procedures.
Honeypots
39
Hidden or undocumented methods for accessing a system or application, often created by attackers for future access.
Backdoors
40
Malware targeting vulnerable Internet of Things devices to use them for malicious purposes.
Crypto-Malware Attacks on IoT Devices
41
Attackers leverage social media platforms to spread malware, conduct phishing, or gather information about targets.
Social Media Attacks
42
Unauthorized alteration or modification of data, which can lead to misinformation and financial or reputational damage.
Data Manipulation
43
Techniques used by malware to generate random domain names for command and control servers to evade detection.
Domain Generation Algorithms (DGA)
44
Compromised IoT devices are used to form botnets for various malicious activities.
IoT Botnets
45
Exploiting vulnerabilities in application programming interfaces (APIs) to gain unauthorized access or cause disruptions.
API Attacks
46
Attackers target vulnerabilities in the Domain Name System Security Extensions (DNSSEC) to compromise DNS integrity.
DNSSEC Exploitation
47
Vulnerabilities in Bluetooth connections can be exploited for unauthorized access or data theft.
Bluetooth Attacks
48
Manipulating a router's DNS settings through vulnerabilities in the router's firmware.
Drive-By Pharming
49
Attackers compromise a product or service at the source, often through a third-party supplier, to distribute malware or compromise security.
Supply Chain Attacks
50
Concealing malicious code or data within seemingly harmless files or images to evade detection.
Steganography