Attacks, Concepts and Techniques Flashcards

Module 2 (36 cards)

1
Q

any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designed to track and spy on you. Monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. It often bundles itself with legitimate software or Trojan horses.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to gain unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands. Works in the background and is difficult to detect.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

designed to hold a computer system or the data it contains captive until a payment is made. Usually works by encrypting your data so that you can’t access it.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

uses ‘scare’ tactics to trick you into taking a specific action.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

designed to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its own code. Requires end-user interaction to initiate activation and can be written to act on a specific date or time.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

carries out malicious operations by masking its true intent. It might appear legitimate but is, in fact, very dangerous. Exploits your user privileges and are most often found in image files, audio files or games.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malware that replicates itself in order to spread from one computer to another. Can run by themselves. They exploit system vulnerabilities, they have a way to propagate themselves, and they all contain malicious code (payload) to cause damage to computer systems or networks

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the manipulation of people into performing actions or divulging confidential information. Relies on people’s willingness to be helpful, but they also prey on their weaknesses.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an attacker quickly follows an authorized person into a secure, physical location.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an attacker requests personal information from a person in exchange for something, like a free gift.

A

Something for something (quid pro quo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

infected by visiting an unsafe website or opening an infected email attachment or infected media file

A

bot computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a group of bots, connected through the Internet, that can be controlled by a malicious individual or group.

17
Q

intercept or modify communications between two devices, such as a web browser and a web server, either to collect information from or to impersonate one of the devices. This type of attack is also referred to as a man-in-the-middle or man-in-the-mobile attack.

A

On-path attackers

18
Q

a cybercriminal takes control of a device without the user’s knowledge.

A

Man-in-the-middle (MitM)

19
Q

type of attack used to take control over a user’s mobile device

A

Man-in-the-mobile (MitMo)

20
Q

SEO

A

search engine optimization

21
Q

proving an organization’s website so that it gains greater visibility in search engine results.

A

Search Engine Optimization (SEO)

22
Q

This technique attempts to gain access to a system by ‘spraying’ a few commonly used passwords across a large number of accounts

A

Password spraying

23
Q

A hacker systematically tries every word in a dictionary or a list of commonly used words as a password in an attempt to break into a password-protected account.

A

Dictionary attacks

24
Q

an attacker using all possible combinations of letters, numbers and symbols in the password space until they get it right.

A

Brute-force attacks

25
compares the hash of a password with those stored in the rainbow table. When an attacker finds a match, they identify the password used to create the hash.
Rainbow attacks
26
Plain text or unencrypted passwords can be easily read by other humans and machines
Traffic interception
27
APT
Advanced Persistent Threats
28
a multi-phase, long term, stealthy and advanced operation against a specific target.
APT (Advanced Persistent Threats)
29
any kind of software or hardware defect.
Security vulnerabilities
30
A program written to take advantage of a known vulnerability
Exploit
31
to gain access to a system, the data it hosts or a specific resource.
Attack
32
digital money that can be used to buy goods and services, using strong encryption techniques to secure online transactions.
Cryptocurrency
33
an emerging threat that hides on a user’s computer, mobile phone, tablet, laptop or server, using that machine’s resources to 'mine’ cryptocurrencies without the user's consent or knowledge.
Cryptojacking
34
Occurs when data is written beyond the limits of memory areas that are allocated to an application
Buffer overflow
35
Occurs when an ordered or timed set of processes is disrupted or altered by an exploit
Race condition
36
Occurs through the improper use of practices that manage equipment, data or applications
Access control