Potential Indicators of Attacks Flashcards

1
Q

What is Malware?

A

Malicious computer Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Virus?

A

Malicious software that spreads with human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

Malicious software that spread on its own on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Crypto malware?

A

Malware that encrypts your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Ransomware?

A

When attackers make organizations pay to decrypt Crypto Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you fight Crypto Malware/ Ransomare?

A

The main way to fight it is by prevent getting it in the first place. You can mitigate this chance by doing user training on email, doing updates, using Antimalware software. If you get ransomware the only thing you can do is either pay the fee for the decryption key or restore from a data backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a trojan?

A

Malware that that you download by pretending to be a different type of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Remote Access Trojan (RAT)

A

Trojan that gives an attacker complete control over your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you fight against Trojans / RAT?

A

Keeping the OS up to date, User Anti Malware, Making sure Firewall is turned on and user Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a BOT?

A

Software that turns computers and IOT devices into hubs to launch Malware attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IOT Devices?

A

a IOT device or Internet of Things Device, is a non standard hardware that can connect to a network (IE Baby Monitors, DVRs, Security Camera ect…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Command and Control Center?

A

The main location where attackers controls the bots /botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is File less virus?

A

Virus that runs in RAM that never touches the HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Logic Bombs?

A

Malware that has a detonation point. This can be time or action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spyware?

A

Malware that steals your information. Can be hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is rootkit?

A

Malware that gives an attacker admin privledges

17
Q

What is backdoor?

A

Malware that allows users to remote in and/or control a computer (RATs are a type of Backdoors)

18
Q

What is Adversarial artificial intelligence (AI)?

A

When an attacker forces AI to do something that it was not suppose to do.

19
Q

What are three ways attackers can create Adversarial AI?

A

Evasion, Poisoning, Model Stealing

20
Q

What is Evasion attacks in Adversarial AI?

A

When the attacker changes it’s attack to evade AI. Ex. Evading Spamware, Malware detectors

21
Q

What is Poisoning when it comes to Adversarial AI?

A

It is when the user changes the data that AI uses to Learn. Ex. changing the definitions of malware to think malware is clean.

22
Q

What is Model Stealing when it comes to Adversarial AI?

A

Probing a black box machine learning system to either reconstruct the model or extract the data it was trained on

23
Q

How do you fight Adversarial AI?

A

Secure Machine Algorithms

24
Q

What is Malicious USB Cables?

A

USB cables that allow you to execute commands through the cable.

25
Q

What is Drivers and Card Cloning?

A

Allows you to skim cards to remake credit cards

26
Q

What is a USB Rubber Ducky

A

USB that allows attackers to connect machines