Threats, Attacks & Vulnerabilities . Flashcards
Malware comes in many different forms (T/F) ?
True!
What are the major malware types?
- Virus
- Worm
- Trojan Horse
- Remote Access Trojan
- Adware
- Spyware
- Ransomware
- Logic Bomb
- Rootkit
- Back Door
This Malware Type…
Spreads between systems based upon some user action.
Virus
This Malware Type…
Spreads between systems by exploiting vulnerabilities; no user action required.
Worm
This Malware Type…
Masquerades as desirable software to trick user into installing it.
Trojan Horse
This Malware Type…
Trojan horse that allows an attacker to gain remote access to a system.
Remote Access Trojan
This Malware Type…
Displays advertisements on the user’s system to generate ad revenue.
Adware
This Malware Type…
Monitors user activity, such as keystrokes and web visits.
Spyware
This Malware Type…
Encrypts user files and demands a ransom before releasing the key.
Ransomware
This Malware Type…
Encrypts user files and demands a ransom before releasing the key.
Ransomware
This Malware Type…
Waits until certain conditions are met before triggering a malicious action.
Logic Bomb
This Malware Type…
Elevated privileges of a normal user to gain administrative rights.
Rootkit
This Malware Type…
Provides an unauthorized mechanism for accessing a system.
Backdoor
_________ engineering attacks manipulate individuals to gain _________ access or information.
- Social
- Unauthorized
What are the different social engineering attack types?
- Phishing
- Spear Phishing
- Whaling
- Tailgating
- Dumpster Diving
- Shoulder Surfing
- Watering Hole
This Attack Type…
Solicits information via email.
Phishing
This Attack Type…
Solicits information via highly targeted email designed for one person.
Spear Phishing
This Attack Type…
Targets high value individuals, such as senior executives.
Whaling
This Attack Type…
Accessed a building by having someone hold the door open.
Tailgating
This Attack Type…
Discovers sensitive information discovered in the trash.
Dumpster Diving