Chapter 2 Type of Attack Indicators Flashcards

1
Q

Crypto-Malware

A
  • Malware that uses a system’s resources to mine cryptocurrency.
  • Theft of services attack uses CPU cycles of someone else’s computer to do crypto mining.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are Trojans used to attack a system?

A
  • A standalone program that must be copied and installed by an authorized user.
  • Appears to do one thing but hides some other functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A
  • Pieces of code that attempt to penetrate network and computer systems.
  • This can survive on its own.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A
  • A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A
  • Malware that typically encrypts files on a system and then leaves them unusable or temporarily until a ransom is paid.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A
  • Usually installed without the user’s knowledge.
  • Can record activities such as keyloggers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spraying

A
  • An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Potentially Unwanted Programs (PUP)

A

A way for companies and antivirus vendors to identify programs that may have adverse effects on a computer’s security or privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless Virus

A
  • Memory-based attack, hard to detect.
  • A piece of malware operates only in memory, never touches the filesystem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor

A
  • Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system.
  • Common backdoors include: Netbus and Back Orifice.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man in the Middle Attack

A

A mechanism whereby an attacker can inject himself into middle of a conversation between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command and Control

A
  • Used to control malware that has been launched against targets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rainbow Tables

A

Precomputed tables or hash values associated with passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dictionary

A

Another method of determining passwords is to use a password-cracking program that uses a list of dictionary words to try to guess the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid Cloud

A
  • One where elements from private, public, and community cloud structures are combined.
  • Environments not joined together but are used together.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access Trojans (RATs)

A

A toolkit designed to provide the capability of court surveillance and/or the capability to gain unauthorized access to a target system.

17
Q

Bots

A
  • A functioning piece of software that performs some task, under the control of another program.
  • Bots can proliferate spam to commit fraud, install spyware, and other malicious acts.
18
Q

Keyloggers

A
  • Piece of software that logs all of the keystrokes that a user enters.
  • Used to obtain passwords and other sensitive pieces of information.
19
Q

Rootkit

A
  • Specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality.
20
Q

Brute Force

A
  • Attempting all password combinations
  • The length of the password can affect the time a brute force attack will take.
21
Q

Offline Brute Force Attack

A
  • Can be employed to perform hash comparisons against a stolen password file.
22
Q

Online Brute Force Attacks

A
  • Can occur against a system in real time.
  • Frequently done to attack a single account with multiple examples of passwords.
22
Q

Malicious Universal Serial Bus (USB) Cable

A
  • Cables embedded with malicious devices such as Wi-Fi devices, enabling attacks against a Wi Fi network.
23
Q

Skimming

A
  • Physical devices built to collect all credit card information as well as the pin number being entered.
24
Adversarial Artificial Intelligence (AI)
- The use of complex models to simulate functions of the brain. - Can be used to enable attacks such as phishing to avoid machine detection.
25
Tainted Training Data for Machine Learning (ML)
- A deficient training set of data can build a model with holes in it which can allow conditions to go undetected.
26
Security of Machine Learning Algorithms
- Should an attacker be able to reproduce the same set of parameters that could slip past the ML algorithm.
27
Supply-Chain Attacks
- The parts and software used to create networks can be tainted which can result in the final product can have vulnerabilities.
27
Cloud-Based vs On-Premise Attacks
- You must define the desired security and the methods of attaining it no matter if the system is cloud-based or in-house.`
28
Cryptographic Attacks
- An attack against a cryptographic system. - Algorithmic weakness that can be exploited
29
Malicious Flash Drive
Malicious USB storage devices have been used to dupe users into plugging these devices into their computers and access sensitive information
30
Card Cloning
Getting the physical possession of and cloning the information on the card to gain access to sensitive information.
31
Birthday Paradox
The chance that two individuals within a group of at least 23 people share the same birthday.
32
Collision Attack
- Two different inputs yield the same output of a hash function. - An attacker has a chance to create a file with changed visible content but identical hashes.
33
Downgrade Attack
- The attacker takes advantage of a commonly employed principle to support backward compatibility.