1.2 Attack Types Flashcards

1
Q

what is malware?

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a virus

A

A virus is malware that can reproduce itself, but i needs the user to launch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is crypto-malware

A

malicious software (malware) that is designed to mine cryptocurrencies without the consent of the computer’s owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a rootkit

A

malicious software program designed to provide unauthorized access and control over a computer or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is malware

A

can reproduce its self
needs you to execute a program
reproduce through a file system or the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Boot sector virus

A

This is a virus that exists in the boot sector of your storage device, and when you start your computer, the virus itself is launched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Macro virus

A

usually running inside of another application. commonly associated with Microsoft Office apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fileless virus

A

virus that never installs itself or saves itself as a file on your file system
never saving itself to the storage drive, then it may be able to evade the antivirus software.
operates solely in the memory of the computer
click a link - run as a Flash file, a Java file or a windows vulnerability in powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

worm

A

does not need user input and can move from system to system itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

remote access Trojan, or remote administration tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PUP

A

Potential unwanted program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password hash

A

hashing of a password takes the password and represents the password as a string of text information. We call this a message digest. You’ll sometimes hear this referred to as a fingerprint. It’s a cryptographic algorithm that cannot be reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHA-256

A

Password hashing algorithim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

spraying attack

A

use some very common passwords and only try a few of them before moving on, inorder not to get locked out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

brute force attack

A

try every combination of letters, numbers, special characters, or anything that could make up a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

brute force off line

A

with a list of username and passwords an off line brute force is used inorder to prevent a lockout

17
Q

dictionary attack,

A

used to gain unauthorized access, trying a large number of possible passwords or passphrases from a precompiled list of words

18
Q

rainbow table

A

database that contains a massive number of optimized hashes
challenge: each type of application or operating system may use a different method to create that hash: have different rainbow tables that are specific to that particular application or that particular operating system

19
Q

salt

A

random data added to the password before it is hashed

there’s is randomness that has been added to every single password

20
Q

machine learning

A

important during the learning process that all of the data going into the machine learning is legitimate. retrain with new data occasionally and make sure that the machine learning is always up to date. use some of the same techniques that the attackers are using just to make sure that your machine learning process does not become vulnerable.

21
Q

cryptographic attacks

A

an attempt to compromise the security of a cryptographic system or algorithm by exploiting its vulnerabilities, weaknesses, or limitations

22
Q

Known-Plaintext Attack

A

the attacker has access to both the plaintext and its corresponding ciphertext. This knowledge is used to deduce the encryption key or algorithm.

23
Q

Chosen-Plaintext Attack

A

attacker can choose specific plaintexts to be encrypted and observe the corresponding ciphertexts. This attack helps the attacker gather information about the encryption process and potentially recover the key.

24
Q

Chosen-Ciphertext Attack

A

the attacker can select ciphertexts and obtain their decrypted versions, which can reveal information about the encryption process and potentially lead to key recovery.

25
Q

Side-Channel Attack

A

does not target the encryption algorithm directly but focuses on information leaked by the physical implementation of the system, such as power consumption, electromagnetic emissions, or timing data.

26
Q

Collision Attack

A

A collision attack attempts to find two different inputs (e.g., messages) that produce the same hash value in a cryptographic hash function

27
Q

MD5

A

Message Digest Algorithm version 5

28
Q

downgrade attack

A

sit-in the middle and influence that conversation, you could have the two sides downgrade to a type of encryption that might be very easy to break