Ch 6. Threats and Vulnerabilities Flashcards
(37 cards)
Open-Source Intelligence
a method of garnering data using public sources, such as social media sites and news outlets
Script Kiddie
an attacker with little expertise or sophistication, they use existing scripts to launch attacks
Hacktivist
an attacker who launches attacks as part of an activist movement or to further a cause
Insider
an attacker who launches attacks from within an organization, typically as an employee
APT
Advanced Persistent Threat; a group that has both the capability and intent to launch sophisticated and targeted attacks
Resource Exhaustion
result of DDoS attack; overloads a computer’s resources (such as processor/memory), resulting in service interruption
DDoS
(Distributed) Denial of Service; an attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users
Malware
malicious software such as viruses, worms, ransomware, etc
Virus
malicious code that attaches itself to a host application, the app must be executed to run
Worm
self-replicating malware that travels through a network, worms do not need user interaction to execute
Logic Bomb
a type of malware that executes in response to an event. Might be specific in date or time, or a user action
Backdoor
an alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it
Trojan
malware that looks useful but is malicious
RAT
Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location
Ransomware
a type of malware used to extort money from individuals and organizations. Typically encrypts the user’s data and demands a ransom before decrypting the data
Crypto-Malware
a type of malware that encrypts a user’s data
Keylogger
software or hardware use to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker
Spyware
software installed on a user’s systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity
Adware
software on ads that tracks user activity
Rootkit
a type of malware that has system-level access to a comp. Rootkits are often able to hide themselves from users and antivirus software
Social Engineering
the practice of using social tactics to gain information
Shoulder Surfing
the practice of looking over someone’s shoulder to obtain info from their comp screen
Screen Filter
a physical security device used to reduce visibility of a comp screen. Screen filters help prevent shoulder surfing
Hoax
a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist