Malware Infections Flashcards

1
Q

Threat Vector

A

Method used by an attacker to access a victim’s machine

examples
unpatched software
phising
plugging in a USB or other multimedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

Method used by an attacker to gain access to a victim’s machine

This is the way the attacker gets to the machine and how they are going to infect it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

watering holes

A

Malware is placed on a website that you know your potential victims will access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typo squatting

A

embedding malware into a webpage made to look like another site

usually these are on variations of well known sites like

www.gooogle.com or www.faceboak.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

botnet

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

zombie

A

A system that is part of a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

Distributed Denial of Service attack

occurs when many machines attack a single system with several other systems simultaneously to jam the victims services.

Usually used by a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

active interception

A

occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

privilege escalation

A

Occurs when you are able to exploit a design flaw or a bug in a system to gain access to resources that a normal user isn’t able to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

backdoor

A

used to bypass normal security and authentication functions by admins and coders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rat

A

Remote Access Trojan

Placed by an attacker to maintain persistent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Easter Egg

A

non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature

This is a bad security practice for coders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

logic bomb

A

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly