Book - 1 Flashcards
(141 cards)
Understand viruses.
Viruses are programs that are designed to spread from one system to another through self-replication and to perform any of a wide range of malicious activities.
Chapter 1.1
Understand crypto-malware.
Crypto-malware is any form of malware that uses cryptography as a weapon or a defense.
Chapter 1.1
Understand ransomware.
Ransomware is a form of malware that aims to take over a computer system in order to block its use while demanding payment.
Chapter 1.1
Understand worms.
Worms are designed to exploit a single flaw in a system (operating system, protocol, service, or application) and then use that flaw to replicate themselves to other systems with the same flaw.
Chapter 1.1
Understand Trojan horses.
A Trojan horse is a form of malicious software that is disguised as something useful or legitimate.
Chapter 1.1
Understand rootkits.
A rootkit is a type of malicious code that fools the OS into thinking that active processes and files don’t exist. Rootkits render a compromised system completely untrustworthy.
Chapter 1.1
Understand keyloggers.
A keylogger is a form of malware that records the keystrokes typed into a system’s keyboard.
Chapter 1.1
Understand spyware and adware.
Spyware gathers information about users and may employ that information to customize advertisements or steal identities. Adware gathers information about users and uses it to direct advertisements to the user. Both spyware and adware are usually unwanted software that gathers information without authorization.
Chapter 1.1
Understand botnets.
A botnet is a network of robots or malicious software agents controlled by a hacker in order to launch massive attacks against targets.
Chapter 1.1
Understand a RAT.
A remote-access Trojan (RAT) is a form of malicious code that grants an attacker some level of remote-control access to a compromised system.
Chapter 1.1
Understand logic bombs.
A logic bomb is a form of malicious code that remains dormant until a triggering event occurs. The triggering event can be a specific time and date, the launching of a specific program, or the accessing of a specific URL.
Chapter 1.1
Understand backdoor attacks.
There are two types of backdoor attacks: a developer-installed access method that bypasses any and all security restrictions, or a hacker-installed remote-access client.
Chapter 1.1
Understand malicious code countermeasures.
The best countermeasure to viruses and other malicious code is an antivirus scanner that is updated regularly and that monitors all local storage devices, memory, and communication pathways for malicious activity. Other countermeasures include avoiding downloading software from the Internet, not opening email attachments, and avoiding the use of removable media from other environments.
Chapter 1.1
Understand social engineering.
Social engineeringis a form of attack that exploits human nature and human behavior. Social engineering attacks take two primary forms: convincing someone to perform an unauthorized operation or convincing them to reveal confidential information.
Chapter 1.2
Understand phishing.
Phishing is the process of attempting to obtain sensitive information such as usernames, passwords, credit card details, or other personally identifiable information (PII) by masquerading as a trustworthy entity (a bank, a service provider, or a merchant, for example) in electronic communication (usually email).
Chapter 1.2
Understand spear phishing.
Spear phishingis a more targeted form of phishing where the message is crafted and directed specifically to an individual or group of individuals. The hope of the attack is that someone who already has an online/digital relationship with an organization is more likely to fall for the false communication.
Chapter 1.2
Understand whaling.
Whalingis a form of phishing that targets specific high-value individuals.
Chapter 1.2
Understand vishing.
Vishing is phishing done over VoIP services.
Chapter 1.2
Understand tailgating and piggybacking.
Tailgatingoccurs when an unauthorized entity gains access to a facility under the authorization of a valid worker but without their knowledge.Piggybackingoccurs when an unauthorized entity gains access to a facility under the authorization of a valid worker but with their knowledge and consent.
Chapter 1.2
Understand impersonation.
Impersonationis the act of taking on the identity of someone else. The purpose of impersonation is to trick someone into believing you’re the claimed identity so you can use the power or authority of that identity. Impersonation is also known as masquerading or spoofing.
Chapter 1.2
Understand dumpster diving.
Dumpster diving is the act of digging through trash in order to obtain information about a target organization or individual. It can provide an attacker with information that could make social engineering attacks easier or more effective.
Chapter 1.2
Understand shoulder surfing.
Shoulder surfing occurs when someone is able to watch your keyboard or view your display. This may allow them to learn your password or see information that is confidential, private, or simply not for their eyes.
Chapter 1.2
Understand hoaxes.
A hoax is a form of social engineering designed to convince targets to perform an action that will cause problems or reduce their IT security. A hoax is often an email that proclaims some imminent threat is spreading across the Internet and that you must perform certain tasks in order to protect yourself.
Chapter 1.2
Understand watering hole attacks.
A watering hole attack is a form of targeted attack against a region, a group, or an organization. It’s waged by poisoning a commonly accessed resource.
Chapter 1.2