Understanding Threat Actors Flashcards
capability, sophistication, targeted, well resourced, funded and often causing a long period of unauthorized access are hallmarks of what type of attack?
Advanced Persistent Threat (ATP)
What is the technical symptom from a DDoS attack?
resource exhaustion (of the CPU/memory etc)
What is the key difference between a virus and a worm
A virus requires the user to execute a program (or the system to do it); worms don’t
What types of malware does the drive-by method relate to? What are the 4 basic steps of a drive-by?
drive-by method is associated with trojan horses and some spyware
- attacks compromise a website
- they install a trojan embedded in the site code
- they trick users to the site
- user visits site and the trojan automatically downloads
rogue-ware is an example of what type of malware?
Trojan. It masquerades as software it isn’t, e.g. fake free anti-virus.
what type of attack allows the attacker to access the victims computer at any time and take control?
RAT (Remote Access Trojan)
What are the key differences between normal spyware and privacy-invasive software?
normal spyware involves monitoring the user’s activity and sending some information to a third party
privacy-invasive software tries to separate users from their money using data-harvesting techniques to then impersonate users.
What is system-level access and what type of attack does it pertain to?
a program that has system-level access has the same permission level for access as the operating system itself.
rootkits use what processes to enable it to control system behavior? How do they work?
hooked processes
they intercept calls to the operating system
rootkits are hard to find, but some tools can detect them, where do they look?
in RAM
Tailgating is a form of what?
Social Engineering
Why do most email clients block images?
To stop beacon links from working that attempt to download an image from a server which results in the server logging your email address as valid.
What’s the difference between spear-fishing and whaling?
spear fishing targets specfic groups of users or a single user
whaling targets a high-level employee like an MD or CEO
What type of common attack can digital signatures protect against?
spear-fishing/whaling
If you receive a call with a pre-recorded automated message on, what attack might be taking place?
Vishing attack