Cyber attacks Flashcards

(58 cards)

1
Q

What’s the Difference? MALWARE

what is a virus?

A

a computer program that
replicates and attaches itself to other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the Difference? MALWARE

Viruses can be spread through what?

A

removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the Difference? MALWARE

what is a worm?

A

a malicious software program that replicates by independently exploiting vulnerabilities in network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the Difference? MALWARE

virus requires what to run?

A

requires a host program to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the Difference? MALWARE

worms require what to run

A

worms can run by themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the Difference? MALWARE

what is a trojan horse?

A

operations by masking its true intent. It might appear legitimate but is, in fact, very dangerous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the Difference? MALWARE

Trojans exploit what?

A

the privileges of the user who runs them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the Difference? MALWARE

unlike viruses, trojans do not what?

A

self-replicate but often bind themselves to non-executable files,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the Difference? MALWARE

what are 3 most common malware

A

1.virus
2.worm
3.trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

logic bombs

what is logic bomb

A

a malicious program that waits for a trigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logic bombs

what sets off a logic bomb

A

a specified date or database entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

logic bombs

once a logic bomb is activated it?

A

implementa a code that causes harm to a computer in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

logic bombs

what does a logic bomb sabotage?

A

1.database record
2.erase files
3.operating system or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

logic bombs

logic bombs attack and destroy what?

A

hardware componets
ex:
cooling fan
cpu
memory
hard drives
powersupplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomeware

what is ransomware?

A

a computer system or the data it contains captive until completed payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomeware

how does rasomware work?

A

encrypting data so the owner cannot access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ransomware

different versions of ransomware can what?

A

take advantage of specific system vulnerabilitys to lock it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ransomware

how is ransomware spreaded

A

spread through phishing emails that encourage you to download a malicious attachment, or through a software vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Denial of Service Attacks

what is (DoS)

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Denial of Service Attacks

what is Denial of service (DoS)

A

type of network attack that interruption to network services, causing a significant loss of time and money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Denial of Service Attacks

what are 2 types of Denial of service (DoS)

A
  1. overwhelming quantity of traffic
  2. maliciously formatted packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Denial of Service Attacks

what is overwhelming quantity of traffic?

A

when a network host/application is sent an enormous amount of data at a rate which it cannot handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Denial of Service Attacks

what does overwhelming quantity of traffic cause?

A

causes a slowdown in transmission or response, or the device/service to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Denial of Service Attacks

what is a packet?

A

a collection of data that flows between a source and a reciver computer or application over a network like internet.

25
# Denial of Service Attacks what is maliciously formatted packets?
an attacker that forwards packets containing erros or improperly formatted packets that cannot be identified by an application.
26
# Denial of Service Attacks maliciously formatted packets causes what?
cause the device to run slowly or crash
27
# Distributed denial of service (DDoS) what is (DDoS)?
Distributed denial of service
28
# Distributed denial of service (DDoS) Distributed denial of service (DDoS)
originate from multiple coordinated sources
29
# Distributed denial of service (DDoS) how does Distributed denial of service (DDoS) happen? 3 steps
1. An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems. 2.The zombie computers constantly scan and infect more hosts, creating more and more zombies. 3.When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.
30
# Domain Name System essential technical services needed for a network to operate
1.routing 2.addressing 3.domain naming ## Footnote prime targets for a attacker
31
# Domain Name System name 4 services.
1.Domain reputation 2.DNS spoofing 3.Domain hijacking 4.Uniform Resource Location (URL)
32
# Domain Name System What is domain reputation?
used by DNS servers to translate a domain name, such as www.cisco.com, into a numerical IP address so that computers can understand it
33
# Domain Name System what is (DNS)
Domain Name System
34
# Domain Name System what is DNS Spoofing and DNS cache poisoning?
an attack in which false data is introduced into a DNS resolver cache
35
# Domain Name System DNS Spoofing and DNS cache poisoning attacks exploit what?
weakness in the DNS software that causes the DNS servers to redirect traffic for a specific domain to the attacker’s computer.
36
# Domain Name System what is domain hijacking
When an attacker wrongfully gains control of a target’s DNS information
37
# Domain Name System what is WHOIS?
a public database that collects all the information for every domain name registration or DNS settings update
38
# Domain Name System what is (URL)?
uniform resource locator
39
# Domain Name System what is uniform resource locator (URL)?
a unique identifier for finding a specific resource on the Internet.
40
# Layer 2 Attacks what is Layer 2 Attacks used for.
used to move data across a linked physical networ
41
# Layer 2 Attacks Layer 2 refers to what?
the data link layer in the Open Systems Interconnection (OSI) data communication model.
42
# Layer 2 Attacks what is (OSI)
Open Systems Interconnection
43
# Layer 2 Attacks what is (MAC) ?
media access control
44
# Layer 2 Attacks what is (APR)?
address resolution protocol
45
# Layer 2 Attacks what does (MAC) address do?
identifies the intended receiver of an IP address sent over the network
46
# Layer 2 Attacks what does (APR) do?
Resolves IP addresses to MAC addresses for transmitting data
47
# Layer 2 Attacks IP addresses are mapped to each physical device address, also known as what?
media access control (MAC) address
48
# Layer 2 Attacks what is spoofing or poisoning?
a type of impersonation attack that takes advantage of a trusted relationship between two systems.
49
# Layer 2 Attacks what is MAC address spoofing?
when an attacker disguises their device as a valid one on the network and can therefore bypass the authentication process.
50
# Layer 2 Attacks what does ARP spoofing do
it sends spoofed ARP messages across a LAN.
51
# Layer 2 Attacks what does ARP spoofing link with?
an attacker’s MAC address to the IP address of an authorized device on the network.
52
# Layer 2 Attacks what does IP spoofing do
sends IP packets from a spoofed source address in order to disguise it.
53
# Layer 2 Attacks what is (MAC) flooding?
compromises the data transmitted to a device.
54
# Layer 2 Attacks Layer 2 Attacks name 2?
1. Spoofing 2. MAC Flooding
55
# Layer 2 Attacks name 3 different types of spoofing
1. MAC address spoofing 2. ARP spoofing 3. IP spoofing
56
# Man-in-the-Middle and Man-in-the-Mobile Attacks what is (MitM)
MAN-IN-THE-MIDDLE
57
when does a (MitM) happen?
When a cybercriminal takes contol of a device without the user's knowledge.
58