Type Of Attack Indicators Flashcards
Software that has been designed for some nefarious purpose. Such software can be designed to cause damage to a system, such as by deleting all files, or it can be designed to create a back door into the system to grant access to unauthorized individuals
Malware
Form of malware that locks the user out of their files, or even the entire device until an online Ransom payment is made to restore access 
Ransomware
A piece of software that appears to do one thing, and may, in fact actually do that thing, but hide some other functionality
Trojans
Acts like a virus, but also have the ability to travel without human action they do not need help to spread
Worms
A designation used by security companies and antivirus vendors to identify programs that may have adverse effects on a computer security and privacy. The software can exhibit some very undesired characteristics, such as the following, slowing down your computer, displaying a ton of annoying ads, adding toolbars that steal space on the browser, collecting private information
Potentially unwanted programs 
When a piece of malware operates only in memory, never touching the file system. It is much harder to tact. Memory based attack
File-less viruses
Servers that are used by hackers to control malware that has been launched against targets
Command and control
A functioning piece of software that performs some task under the control of another program 
Bots
The name of the security industry has given to malware that uses a systems resources to mine cryptocurrency
Crypto-Malware
A type of malicious software that is deliberately installed, generally by an authorized user. It is a piece of code that sits dormant for a period of time until summer event or date invokes the malicious payload 
Logic bombs
Software that spies on users, recording, and reporting on their activities 
Spyware
A piece of software, that logs, all of the key strokes how to user enters
Keylogger
A tool kit designed to provide the capability of covert surveillance, and or the capability to gain unauthorized access to a target system 
Remote-Access Trojans (RATs)
A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate non-standard functionality 
Rootkit
Originally, and sometimes still are nothing more than methods used by software developers to ensure that they can gain access to an application, even if something were to happen in the future to prevent normal access methods
Backdoors
An attack that uses a limited number of commonly use passwords and applies them to a large number of accounts 
Spraying
Password, cracking program that uses a list of dictionary, where to try to guess the password
Dictionary
Attempts all possible password combination 
Brute force
Replace the tax can be employed to perform hash comparisons against the stolen password file
Offline
When the brute force attack occurs in real time against the system, it is frequently being done to attack a single account with multiple examples of passwords
Online
Pre-computer tables are hash values associated with passwords 
Rainbow tables
Little Caesars view a USB cable is just a wire, but in fact, a USB cable can have embedded electrons in a poison cables have been found with electronics that can deliver malware to machines
Malicious universal serial bus (USB) cable 
Malicious USB storage devices have been around for a long time 
Malicious flash drives
Getting physical hold of somebody’s credit card you can copy the information on the magnetic strip 
Card cloning
Physical devices built to intercept a credit card
Skimming
Reproduces by attaching itself to other files or programs 
Virus