Section 1 – Attacks, Threats, and Vulnerabilities / 1.2 – Attack Types Flashcards

1
Q

What is a Viruses

1.2 – Attack Types

A

A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself.

viruses are primarily spread through email messages. Unlike worms, viruses often require some sort of user action (e.g., opening an email attachment or visiting a malicious web page) to spread.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a worm

1.2 – Attack Types

A

A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively.

A worm can self-replicate and spread to other computers, while a virus cannot.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware

1.2 – Attack Types

A

Malware is short for malicious softwar.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Ransomeware

1.2 – Attack Types

A

Ransomeware is a type of malicious software designed to block access to a computer system until a sum of money is paid.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Crypto-malware

1.2 – Attack Types

A

Crypto malware often refers to a type of malware that aims to mine cryptocurrencies on a victim’s computer without detection.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan and what are RATs

1.2 – Attack Types

A

Trojan horse software is software that pretends to be something else and it looks like software that is perfectly normal.

RATs: Remote Access Trojan or Remote Administration Tool

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Rootkits

1.2 – Attack Types

A

A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer’s hardware and firmware.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spyware

1.2 – Attack Types

A

Spyware is a type of malicious software – or malware – that is installed on a computing device without the end user’s knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is adware

1.2 – Attack Types

A

Adware refers to a type of malware that displays unwanted advertisements on your computer or device.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are bots and botnets

1.2 – Attack Types

A

A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Logic Bomb

1.2 – Attack Types

A

a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password Attacks

1.2 – Attack Types

A

Password attacks are malicious ways hackers attempt to gain access to your account. Examples of password attacks include brute-force attacks, credential stuffing, and password spraying.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Attacks

1.2 – Attack Types

A

A cyber-physical attack is a security breach that impacts operations, damages property, or otherwise impacts the physical environment.

Example: Stuxnet, a cyberweapon designed to target Iranian nuclear enrichment facilities, was initially delivered via malicious USB drives. The worm then went on to physically destroy the centrifuges used to refine uranium, showing that cyber attacks can have physical consequences as well as physical delivery.

Example: Stealing credit card information has become a big business, and there’s so many different ways that the bad guys are trying to gain access to our credit card numbers. One way they’re able to do this is with skimming. This is stealing our credit card information as we use the card for some other purpose.

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.2 – Attack Types

A

1.2 – Attack Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly