1.2 Attack Types Flashcards

1
Q

Define Ransomware

A

Denying one access to their data until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Trojan

A

Malicious software disguised as a valid program to trick users into installing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Worm

A

Malware that can spread without any human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a virus and a worm?

A

Virus requires human interaction to be installed, a worm is able to install and spread itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Potentially unwanted programs (PUPs)

A

Programs that aren’t necessarily harmful, but cause unwanted annoyances, like pop-up ads, alternate internet search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do fileless viruses evade detection?

A

By running as a valid process, such as Flash, JavaScript, or PowerShell, modify registry to add to start-up programs/processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Fileless virus

A

A virus that runs in memory but is never installed to the hard drive and evades detection by anti-virus programs with this technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Command and Control

A

Server that controls the bots established in a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Bots/Botnet

A

Infecting multiple computers with a virus to launch complex attacks coming from multiple locations, such as a DDoS (Distributed Denial of Service) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Crypto-malware

A

Type of ransomware that encrypts ones data until a ransom is paid to get the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to protect against crypto-malware attacks (other than anti-virus/malware)?

A

Keep system backups on device inaccessible from the computer/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Logic Bomb

A

Malware designed to take action in the future based on a date or action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Spyware

A

Malware that forwards information, such as keystrokes or internet browsing history, to a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Keylogger and its attack advantage (2)

A
  1. Malware that can send typed input, clipboard data and screenshots to an attacker
  2. bypasses encryption so can get passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Remote access trojan (RAT)

A

Malware that allows complete remote control of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Rootkit

A

Malware that embeds in the kernel of the OS and is very difficult to remove or detect

17
Q

What is the best way to protect against Rootkits?

A

UEFI BIOS secure boot to prevent boot if kernel has been modified

18
Q

Define Backdoor

A

Creation of an opening in the system to bypass security and allow installation of other malware or remote system access

19
Q

Define Password attack - Spraying

A

To avoid account lockout, just a few common passwords from a list are tried before moving on

20
Q

Define Password attack - Dictionary

A

Sub-type of brute force attack that uses a pre-defined list of common words to find a password match

21
Q

Define Password Attack - Offline vs Online

A
  1. An online password attack has limited potential since actively trying username/passwords is limited to a certain number of failed attempts before the account is locked out
  2. Offline password attacks are done by obtaining the files containing usernames/passwords and then cracking those with equipment offline or separate from the live website or organization
22
Q

Define Password attack - Brute force

A

Trying every possible combination of letters, numbers and characters until the password match is found

23
Q

Define Password attack - Rainbow tables

A

A dictionary that stores the hashed result of the plaintext password, instead of the plaintext

24
Q

Define Password attack - Plaintext/unencrypted

A

Passwords stored as plaintext, if compromised, every password in that file or database are compromised

25
Malicious USB cable
Normal looking USB cable that has additional electronics inside allowing it to compromise any system that it is plugged into
26
Malicious flash drive
1. Same capabilities as malicious USB cable 2. Also can have malware embedded in normal looking files that executes upon opening the file
27
Card cloning
Copying the magnetic strip of a card onto a new card that an attacker can use
28
True/False: Chips on cards can be cloned
False
29
Skimming
Obtaining card information from the magnetic strip when a card is swiped or from the system that has the magnetic strip reader
30
Adversarial AI - Tainted training data for machine learning (ML)
Providing invalid data to an AI system to influence its learning process so that it produces a malicious output, also called "poisoning"
31
Adversarial AI - Security of machine learning algorithms
If AI data has personal information, attackers can figure out how to manipulate the AI to obtain that information
32
Supply-chain attacks
Exploitation of vendors used by an organization for attacks
33
2 Examples of Supply-chain attacks
1. Compromising equipment before vendor delivers it to the organization 2. Compromising security credentials vendor uses to access the organization
34
Advantage of using on-premises infrastructure
Complete control and knowledge of the security of stored data
35
Advantages of using cloud-based infrastructure (2)
1. Advantages of large-scale, higher, security that may be out of budget or skill for an organization to implement 2. Implementing changes is much since it usually involves just spinning up a virtual device
36
Cryptographic attack - Birthday
A brute force attack to break encryption due to hash collisions
37
Cryptographic attack - Collision
When a hashing algorithm produces the same hash for at least 2 different inputs
38
How to prevent birthday/collision based attacks
Use longer hashes
39
Cryptographic attack - Downgrade
A man-in-the-middle attack that influences the encryption level chosen between 2 end devices for the transport of data to be a lower, less secure encryption so that it can be more easily broken and intercept the communication