Types of Attack Flashcards
Ransomware
Malicious software that encrypts files and demands payment for their release.
Trojans
Programs that appear legitimate but contain malicious code.
Malicious software that encrypts files and demands payment for their release.
Ransomware
Programs that appear legitimate but contain malicious code.
Trojans
Worms
Self-replicating malware that spreads across networks.
Self-replicating malware that spreads across networks.
Worms
Potentially Unwanted Programs (PUPs)
Software that may have unwanted effects, often bundled with legitimate applications
What term refers to software applications that exhibit undesirable behavior?
Potentially Unwanted Programs (PUPs)
Describe a fileless virus.
A fileless virus is a type of malware that operates in memory without leaving traces on disk, making detection challenging for traditional antivirus software.
What type of malware operates in memory without leaving traces on disk?
Fileless virus
What is Command and Control (C&C) ?
Command and control refers to the communication channel used by attackers to control compromised devices and exfiltrate data from targeted systems.
What term describes the communication channel used by attackers to control compromised devices?
Command and control
Define bots in cybersecurity.
Bots are automated software agents that perform tasks, often maliciously, without human intervention, such as spreading malware or launching DDoS attacks.
What are automated software agents that perform tasks, often maliciously?
Bots
Explain cryptomalware.
Cryptomalware is a type of malware that encrypts files or systems and demands ransom for decryption, often using strong encryption algorithms.
What type of malware encrypts files and demands ransom for decryption?
Cryptomalware
What are logic bombs?
Logic bombs are code snippets inserted into systems to execute a malicious action at a specific time or after a triggering event, often causing system disruptions or data loss.
What type of code is inserted into systems to execute a malicious action at a specific time or event?
Logic bombs
Define spyware.
Spyware is a type of malware that secretly gathers information about a user’s activities without their consent, often for advertising or espionage purposes.
What type of malware secretly gathers information about a user’s activities?
Spyware
Describe keyloggers.
Keyloggers are software or hardware devices designed to record keystrokes, capturing sensitive information such as passwords or credit card numbers.
What software or hardware devices record keystrokes?
Keyloggers
What is a Remote Access Trojan (RAT)?
A Remote Access Trojan is a type of malware that provides unauthorized access to a victim’s system, allowing remote control by an attacker.
What type of malware provides unauthorized access to a victim’s system for remote control?
Remote Access Trojan (RAT)