Notable Threats in Cyber (Malware, Ransomware, etc.) Flashcards

1
Q

What is malware?

A

Malware is malicious software designed to harm, exploit, or otherwise compromise computers, networks, or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common types of malware?

A

Common types of malware include viruses, worms, Trojans, spyware, and adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ransomware?

A

Ransomware is a type of malware that encrypts a victim’s files, locking them until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What impact can ransomware have?

A

Ransomware can lead to data loss, financial losses, and operational disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name three notable ransomware strains.

A

Cryptolocker, WannaCry, and REvil.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

Phishing is a social engineering attack where attackers impersonate legitimate entities to steal sensitive information like passwords and credit card details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does spear phishing differ from regular phishing?

A

Spear phishing targets specific individuals, whereas regular phishing is often indiscriminate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Advanced Persistent Threat (APT)?

A

An APT is a long-term, targeted attack by sophisticated actors, often state-sponsored, aimed at infiltrating networks and stealing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DDoS attack?

A

A Distributed Denial of Service (DDoS) attack overwhelms servers with traffic, rendering services unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary goal of a DDoS attack?

A

The primary goal of a DDoS attack is to disrupt business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are zero-day exploits?

A

Zero-day exploits are attacks that target previously unknown vulnerabilities before developers can issue a patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are zero-day exploits particularly dangerous?

A

They are dangerous because they lack immediate defenses, leading to potential data breaches and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is social engineering in cybersecurity?

A

Social engineering is the exploitation of human psychology to gain unauthorized access, often without technical hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three common social engineering techniques.

A

Phishing, pretexting, and baiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an insider threat?

A

An insider threat is malicious action by employees or internal stakeholders who have access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the impact of insider threats?

A

Insider threats can cause data leaks, intellectual property theft, and operational disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Man-in-the-Middle (MitM) attack?

A

A MitM attack is when attackers intercept and alter communications between two parties to steal data or inject malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does credential stuffing involve?

A

Credential stuffing involves using stolen credentials to access accounts through automated login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is cryptojacking?

A

Cryptojacking is the unauthorized use of a device’s resources to mine cryptocurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are IoT vulnerabilities?

A

IoT vulnerabilities are security weaknesses in Internet of Things devices, often due to insufficient security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What risks do IoT vulnerabilities present?

A

They lead to botnet formation, privacy violations, and exploitation of connected systems.

22
Q

What are cloud security threats?

A

Cloud security threats are attacks specifically targeting cloud environments, exploiting weak configuration, API vulnerabilities, or insecure interfaces.

23
Q

What are the risks associated with supply chain attacks?

A

Supply chain attacks compromise systems by infiltrating networks via trusted third-party providers.

24
Q

Give an example of a high-profile supply chain attack.

A

The SolarWinds attack is an example of a high-profile supply chain attack.

25
Q

What are deepfakes?

A

Deepfakes are AI-generated media, often video or audio, that impersonates individuals convincingly.

26
Q

What is the impact of deepfakes on security?

A

Deepfakes facilitate misinformation, identity fraud, and can compromise trust in digital media.

27
Q

What are mobile security threats?

A

Mobile security threats are attacks targeting mobile devices, often through app vulnerabilities or rogue Wi-Fi networks.

28
Q

Name two examples of mobile security threats.

A

Malicious apps and SMS phishing (smishing).

29
Q

What is fileless malware?

A

Fileless malware doesn’t rely on files but exploits legitimate programs, running in memory to avoid detection.

30
Q

How does fileless malware evade detection?

A

It avoids detection by traditional antivirus software, allowing attackers to bypass many defenses.

31
Q

What is rogue software?

A

Rogue software pretends to be legitimate security or utility software, often tricking users into installing it.

32
Q

What is scareware?

A

Scareware uses fake warnings to scare users into taking unsafe actions, often leading to malware installations.

33
Q

What are watering hole attacks?

A

Watering hole attacks compromise websites frequently visited by specific organizations or industries to infect visitors.

34
Q

What is a Business Email Compromise (BEC)?

A

BEC is a phishing attack where attackers impersonate executives or partners to request transfers of funds or sensitive information.

35
Q

What are Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF)?

A

XSS and CSRF are web vulnerabilities where attackers inject scripts or trick users into actions they didn’t intend.

36
Q

What is privilege escalation?

A

Privilege escalation is when attackers exploit vulnerabilities to gain higher access levels within a system.

37
Q

What is DNS spoofing?

A

DNS spoofing is when attackers alter DNS records to redirect users to malicious websites.

38
Q

What is SQL injection?

A

SQL injection is an attack where attackers inject malicious SQL commands to manipulate or retrieve sensitive data from databases.

39
Q

What is a drive-by download attack?

A

A drive-by download attack installs malware on a user’s device simply by visiting a compromised website.

40
Q

What is SIM swapping?

A

SIM swapping is when attackers hijack phone numbers by tricking telecom providers into transferring them to a new SIM.

41
Q

What is the dark web’s role in cybersecurity?

A

The dark web facilitates the buying and selling of stolen data, including personal information, credentials, and credit card details.

42
Q

How can attackers exploit AI and machine learning?

A

They can manipulate AI systems to produce incorrect outputs or exploit weaknesses, affecting decision-making and security.

43
Q

What is code injection?

A

Code injection is when attackers insert malicious code into a system through software vulnerabilities.

44
Q

What are typosquatting and URL hijacking?

A

Typosquatting and URL hijacking involve attackers registering domains similar to legitimate ones to trick users into visiting malicious sites.

45
Q

What is firmware, and why are firmware attacks dangerous?

A

Firmware is software embedded in hardware components; firmware attacks can lead to persistent system compromise.

46
Q

What is quantum computing’s potential threat to cybersecurity?

A

Quantum computing could break many current encryption standards, making them obsolete.

47
Q

What are behavioral analytics in cybersecurity?

A

Behavioral analytics detect anomalies like unusual login patterns to identify potential threats.

48
Q

What is Zero Trust Architecture?

A

Zero Trust Architecture continuously verifies user identity and access, reducing the risk of unauthorized access.

49
Q

What are Hardware Security Modules (HSMs)?

A

HSMs are secure hardware components used to protect encryption keys from attacks.

50
Q

What is the purpose of threat intelligence feeds?

A

Threat intelligence feeds provide the latest information on threats and indicators of compromise to help organizations stay informed.