☠️ Common Threat Types (Malware, Phishing, etc.) Flashcards
☠️ Common Threat Types (Malware, Phishing, etc.) (20 cards)
What is malware?
Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
What is a virus in cybersecurity?
A type of malware that attaches itself to files and spreads when the file is executed.
How does a worm differ from a virus?
A worm can replicate and spread independently without attaching to files or programs.
What is a Trojan horse in cybersecurity?
Malware disguised as legitimate software that tricks users into installing it.
What is ransomware?
Malware that encrypts files and demands payment to restore access.
What is spyware?
Malware that secretly gathers user information without consent.
What is a keylogger?
A type of spyware that records keystrokes to steal sensitive information.
What is adware?
Unwanted software that displays ads and may track user behavior.
What is phishing?
A social engineering attack that tricks users into revealing personal or financial information.
How does spear phishing differ from phishing?
It targets specific individuals or organizations using personalized information.
What is whaling in cybersecurity?
A phishing attack targeting high-profile individuals like executives (aka ‘big fish’).
What is a botnet?
A network of infected devices (bots) controlled remotely to perform coordinated attacks.
What is a rootkit?
Malware designed to gain and hide privileged access to a system.
What is a zero-day attack?
An exploit that takes advantage of a previously unknown vulnerability.
What is a man-in-the-middle (MITM) attack?
An attack where the attacker intercepts and possibly alters communications between two parties.
What is SQL injection?
A web attack where malicious SQL code is inserted into an input field to manipulate a database.
What is DNS poisoning?
An attack that corrupts the DNS cache, redirecting users to malicious websites.
What is a brute-force attack?
A trial-and-error method used to crack passwords by trying all possible combinations.
What is social engineering?
The manipulation of people to gain confidential information or access.
What is the purpose of a payload in a cyber attack?
It is the malicious part of an exploit that performs the harmful action, like deleting files or installing malware.