Chapter 6 Flashcards

Comparing Threats, Vulnerabilities , and Common Attacks

1
Q

Open-Source Intelligence

A

A method of gathering data using public sources, such as social media sites and news outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

An attacker with little expertise or sophistication

Script kiddies use existing scripts to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

An attacker who launches attacks as part of an activist movement or to further a cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider

A

An attacker who launches attacks from within an organization, typically as an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced persistent threat is a group that has both the capability and intent to launch sophisticated and targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS

A

Denial-of-service is an attack from a single source that attempts to disrupt the services provided by the attacked system

Compare with DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

Distributed denial -of-service is an attack on a system launched from multiple source intended to make a computer’s resources or services unavailable to users

DDoS attacks typically include sustained, abnormally high network traffic

Compare with DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource Exhaustion

A

The malicious result of many DoS and DDoS attacks

The attack overloads a computer’s resources (such as the processor and memory), resulting in service interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Malicious code that attaches itself to a host application

The host application must be executed to run, and the malicious code executes when the host application is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

Self-replacing malware that travels through a network

Worms do not need user interaction to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

A type of malware that executes in response to an event

The event might be a specific date or time, or a user action such as when a user launches a specific program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Malicious software

It includes a wide range of software that has malicious intent, such as viruses, worms, ransomware, rootkits, logic bombs, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backdoor

A

An alternate method of accessing a system

Malware often adds a backdoor into a system after it infects it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

Malware also known as a Trojan horse

A Trojan often looks useful, but is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RAT

A

Remote access Trojan

Malware that allows an attacker to take control of a system form a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

A type of malware used to extort money from individuals and organization

Ransomware typically encrypts the user’s data and demands a ransom before decryption the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Crypto-Malware

A

A type of ransomware that encrypt the user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Keylogger

A

Software or hardware used to capture a user’s keystrokes

Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spyware

A

Software installed on users’ systems without their awareness or consent

Its purpose is often to monitor the user’s computer and the user’s activity

20
Q

Bots

A

Software robots that function automatically

A botnet is a group of computers that are joined together

Attackers often use malware to join computers to a botnet, and then use the botnet to launch attacks

21
Q

Rootkit

A

A type of malware that has system-level access to a computer

Rootkits are often able to hide themselves from users and antivirus software

22
Q

Social Engineering

A

The practice of using social tactics to gain information

Social engineers attempt to gain information from people, or get people to do things they wouldn’t normally do

23
Q

Shoulder Surfing

A

The practice of looking over someone’s shoulder to obtain information, such as on a computer screen

A screen filter placed over a monitor helps reduce the success of shoulder surfing

24
Q

Screen Filter

A

A physical security device used to reduce visibility of a computer screen

Screen filters help prevent shoulder surfing

25
Hoax
A message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn't exist
26
Tailgating
A social engineering attack where one person follows behind another person without using credentials Mantraps help prevent tailgating
27
Mantrap
A physical security mechanism designed to control access to a secure area A mantrap prevents tailgating
28
Dumpster Diving
The practice of searching through trash looking to gain information from discarded documents Shredding or burning papers helps prevent the success of dumpster diving
29
Watering Hole Attack
An attack method that infects web sites that a group is likely to trust and visit
30
Spam
Unwanted or unsolicited email Attackers often launch attacks using spam
31
Phishing
The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link
32
Domain Abuse Notice
Filler
33
Spear phishing
A targeted form of phishing Attackers often launch attacks using spam
34
Whaling
A form of spear phishing that attempts to target high-level executives When successful, attackers gain confidential company information that they might not be able to get anywhere else
35
Privilege Escalation
The process of gaining elevated rights and permissions Malware typically uses a variety of techniques to gain elevated privileges
36
Spam Filter on Mail Gateways
Filler
37
Anti-Malware Software on Mail Gateways
Filler
38
All Systems
Filler
39
Boundaries or Firewalls
Filler
40
Antivirus
Software that protects systems from malware Although it is called antivirus software, it protects against most malware, including viruses, Trojans, worms, and more
41
DEP
Filler
42
Spam Filter
Spam filter is a method of blocking unwanted email By blocking email, it often blocks malware
43
Zero-Day Vulnerability
A vulnerability or bug that is unknown to trusted sources but can be exploited by attackers Zero-day attacks take advantage of zero-day vulnerabilities
44
Impersonation
Filler
45
Vishing
Filler