Ch 6. Threats and Vulnerabilities Flashcards

(37 cards)

1
Q

Open-Source Intelligence

A

a method of garnering data using public sources, such as social media sites and news outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

an attacker with little expertise or sophistication, they use existing scripts to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

an attacker who launches attacks as part of an activist movement or to further a cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider

A

an attacker who launches attacks from within an organization, typically as an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat; a group that has both the capability and intent to launch sophisticated and targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Resource Exhaustion

A

result of DDoS attack; overloads a computer’s resources (such as processor/memory), resulting in service interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

(Distributed) Denial of Service; an attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

malicious software such as viruses, worms, ransomware, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

malicious code that attaches itself to a host application, the app must be executed to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

self-replicating malware that travels through a network, worms do not need user interaction to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

a type of malware that executes in response to an event. Might be specific in date or time, or a user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backdoor

A

an alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan

A

malware that looks useful but is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT

A

Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

a type of malware used to extort money from individuals and organizations. Typically encrypts the user’s data and demands a ransom before decrypting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Crypto-Malware

A

a type of malware that encrypts a user’s data

17
Q

Keylogger

A

software or hardware use to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker

18
Q

Spyware

A

software installed on a user’s systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity

19
Q

Adware

A

software on ads that tracks user activity

20
Q

Rootkit

A

a type of malware that has system-level access to a comp. Rootkits are often able to hide themselves from users and antivirus software

21
Q

Social Engineering

A

the practice of using social tactics to gain information

22
Q

Shoulder Surfing

A

the practice of looking over someone’s shoulder to obtain info from their comp screen

23
Q

Screen Filter

A

a physical security device used to reduce visibility of a comp screen. Screen filters help prevent shoulder surfing

24
Q

Hoax

A

a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist

25
Tailgaiting
a social engineering attack where one person follows behind another person without using credentials
26
Mantrap
a physical security mechanism designed to control access to a secure area, prevents tailgating
27
Dumpster Diving
the practice of searching through trash looking to gain information from discarded documents
28
Watering Hole Attack
an attack that infects web sites that a group is likely to trust and visit
29
Spam
unwanted or unsolicited email. Attackers often launch attacks using spam
30
Phishing
the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link
31
Spear Phishing
a targeted form of phishing. Spear phishing attacks attempt to target specific groups of users, such as those within a specific organization, or even a single user
32
Whaling
a form of spear phishing that attempts to target high-level executives
33
Privilege Escalation
the process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges
34
Vishing
use of VoIP for phishing
35
DEP
Data Execution Prevention; a security feature that prevents code from executing in memory regions marked as nonexecutable, helps prevent malware
36
Spam Filter
method of blocking unwanted email
37
Zero-Day Vulnerability
a vulnerability or bug that is unknown to trusted sources but can be exploited by attacked