1.2 Flashcards
(31 cards)
A type of malware that encrypts a victim’s files or locks their computer, demanding payment in exchange for restoring access
ransomware
A type of malware that disguises itself as legitimate software to trick victims into downloading and installing it, allowing attackers to gain unauthorized access to their system
TROJAN
A self-replicating type of malware that spreads through networks, often causing damage to computer systems
WORM
Software that is installed without the user’s consent, typically with the purpose of displaying ads or collecting data
pup POTENTIALLY UNWATNTED PROGRAM
A type of malware that operates entirely in computer memory without writing any files to disk, making it difficult to detect and remove
fileless virus
A mechanism used by attackers to communicate with malware-infected devices and control their behavior
Command and control (C&C)
type of automated cyber attack, where software programs perform malicious activities such as sending spam emails, scraping data, launching DDoS attacks, and brute-forcing passwords.
Bots
A type of malware that remains dormant until triggered by a specific event or condition, often causing damage to computer systems
Logic Bomb
Malware that secretly collects information from a victim’s device and sends it to attackers
spyware
A type of spyware that captures keystrokes made by a victim, allowing attackers to steal sensitive information such as passwords
Keylogger
A type of trojan that allows attackers to remotely control a victim’s device, often used for spying or stealing data
RAT (Remote Access Trojan)
Malware that hides its presence and activity on a victim’s device, making it difficult to detect and remove
Rootkit
A hidden entry point in software or devices that allows attackers to bypass normal security measures and gain unauthorized access
Backdoor
A brute-force password attack in which attackers try a small number of commonly-used passwords against a large number of user accounts
Spraying
A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account
Dictionary Attack
A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account
Dictionary Attack
A password attack in which attackers try every possible combination of characters until they find the correct password
Brute Force Attack
A password attack in which attackers use precomputed tables of hashes to quickly crack passwords
Rainbow Table Attack
Data that is not encrypted and can be read by anyone who has access to it, making it vulnerable to interception and theft.
Plaintext/unencrypted
A type of hardware attack that involves a USB cable that is modified to include additional hardware or software to carry out malicious activities, such as stealing data or installing malware
Malicious Universal Serial Bus (USB) Cable
A type of hardware attack that involves a flash drive that is loaded with malware and left in a public place for victims to pick up and use, potentially infecting their computer
Malicious Flash Drive
A type of attack that involves stealing credit card information and creating a duplicate card to make fraudulent purchases
Card Cloning
A type of attack that involves stealing credit card information using a small device that is attached to a legitimate card reader, often found in public places such as ATMs or gas pumps
Skimming
A type of attack that involves manipulating or poisoning the data used to train machine learning algorithms, causing the algorithms to make incorrect predictions or decisions
Tainted Training Data for Machine Learning