1.2 Analyze potential indicators to determine the type of attack Flashcards
(29 cards)
Malware
-Ransomware
Malware
-Trojans
Malware
-Worms
Malware
-Potentially unwanted programs (PUPs)
Malware
-Fileless virus
Malware
-Command and control
Malware
-Bots
Malware
-Cryptomalware
Malware
-Logic bombs
Malware
-Spyware
Malware
-Keyloggers
Malware
-Remote access Trojan (RAT)
Malware
-Rootkit
Malware
-Backdoor
Password attacks
-Spraying
Password attacks
-Dictionary
Password attacks
-Bruteforce online/offline
Password attacks
-Rainbow table
Password attacks
-Plaintext/unencrypted
Physical attacks
-Malicious Universal Serial Bus (USB) cable
Physical attacks
-Malicious flash drive
Physical attacks
-Card cloning
Physical attacks
-Skimming
Adversarial artificial intelligence (AI)
-Tainted training data for machine learning (ML)