Types of Malicious Attacks Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Someone who violates computer or Internet security maliciously or for illegal personal gain.

A

Black hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An individual who causes problems, steals data, and corrupts systems

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations

A

Malicious insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

A

Industrial spy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Someone who attacks a computer system or network for financial gain

A

Cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An individual who hacks computers or websites in an attempt to promote a political ideology

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units

A

Cyberterrorist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hangs out in active memory of computer and duplicates itself.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hidden malicious program attached to something that seems harmless.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type of trojan horse that triggers automatically by a specific event

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Combines features of Virus, Worm, Trojan Horse, etc., and can attack from any vulnerability

A

Blended Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a hacker makes lots of computers flood a site with many small tasks to make it useless for normal users.

A

Distributed Denial-of-service (DDos) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Law that makes it legal to send spam as long as there isn’t a false return address, and does have a label specifying an ad, and opt out button.

A

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Large group of computers used (with or without consent of owners) to launch DDos Attack

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enables administrator access to computer without owners consent

17
Q

Where an intruder gains access to a computer and stays. More interested in stealing data than disrupting services.

A

Advanced Persistent Threat (APT)

18
Q

a type of phishing that targets a specific organization.

A

Spear phishing

19
Q

A type of phishing done through text.

20
Q

A type of phishing done through voicemail

21
Q

Deployment of Malware that secretly steals data from government agencies, or companies. Most likely to leverage an unfair advantage.

A

Cyber espionage

22
Q

The use of a malicious program used to achieve political, religious, or ideological goals.

A

Cyberterrorism

23
Q

An organization that analyzes reported cyber attacks.

A

U.S. Computer Emergency Readiness Team (US-CERT)