Notable Threats in Cyber (Malware, Ransomware, etc.) Flashcards
What is malware?
Malware is malicious software designed to harm, exploit, or otherwise compromise computers, networks, or devices.
What are common types of malware?
Common types of malware include viruses, worms, Trojans, spyware, and adware.
What is ransomware?
Ransomware is a type of malware that encrypts a victim’s files, locking them until a ransom is paid.
What impact can ransomware have?
Ransomware can lead to data loss, financial losses, and operational disruptions.
Name three notable ransomware strains.
Cryptolocker, WannaCry, and REvil.
What is phishing?
Phishing is a social engineering attack where attackers impersonate legitimate entities to steal sensitive information like passwords and credit card details.
How does spear phishing differ from regular phishing?
Spear phishing targets specific individuals, whereas regular phishing is often indiscriminate.
What is an Advanced Persistent Threat (APT)?
An APT is a long-term, targeted attack by sophisticated actors, often state-sponsored, aimed at infiltrating networks and stealing data.
What is a DDoS attack?
A Distributed Denial of Service (DDoS) attack overwhelms servers with traffic, rendering services unavailable to legitimate users.
What is the primary goal of a DDoS attack?
The primary goal of a DDoS attack is to disrupt business operations.
What are zero-day exploits?
Zero-day exploits are attacks that target previously unknown vulnerabilities before developers can issue a patch.
Why are zero-day exploits particularly dangerous?
They are dangerous because they lack immediate defenses, leading to potential data breaches and unauthorized access.
What is social engineering in cybersecurity?
Social engineering is the exploitation of human psychology to gain unauthorized access, often without technical hacking.
Name three common social engineering techniques.
Phishing, pretexting, and baiting.
What is an insider threat?
An insider threat is malicious action by employees or internal stakeholders who have access to sensitive information.
What is the impact of insider threats?
Insider threats can cause data leaks, intellectual property theft, and operational disruptions.
What is a Man-in-the-Middle (MitM) attack?
A MitM attack is when attackers intercept and alter communications between two parties to steal data or inject malicious content.
What does credential stuffing involve?
Credential stuffing involves using stolen credentials to access accounts through automated login attempts.
What is cryptojacking?
Cryptojacking is the unauthorized use of a device’s resources to mine cryptocurrency.
What are IoT vulnerabilities?
IoT vulnerabilities are security weaknesses in Internet of Things devices, often due to insufficient security features.