1.2 Indicators to type of attack
Trojan
A ________, appears to be something useful but includes a malicious component, such as installing a backdoor on a user's system.
Worms
A ________, is a self-replicating malware that travels throughout a network without the assistance of a host application or user interaction. Resides in memory and can use different transport protocols to travel over the network.
Cryptomalware
Attackers encrypt the data on computers within the network to prevent access, then demand the user or organization pay a sum of money to regain access to data or computers
Ransomware
Attackers take control of computers or networks then demand that the user or organization pay a sum of money to regain access to the data or computers.
Command and Control
Attackers use _______ to control infected computers. _______ resources have commonly been used to control zombies within botnets
Bot/Botnets
Includes multiple computers that act as software ______ and function together in a network, often for malicious purposes. They will do the bidding of whoever controls the botnet.
Fileless Virus
_____ is a type of malicious software that runs in memory and often scripts that are injected into legitimate programs
Birthday Attack
______ an attacker attempts to create a password that produces the same hash as the user's actual password.
Rainbow Table
______ are a type of attack that attempts to discover the password from the hash. _______ is a huge database of passwords with precomputed hashes for each.
Offline Password Attacks
______ attempts to discover passwords from a captured database or captured packet scan.
Brute Force attacks
______ attempts to guess all possible character combinations
Supply Chain Risks
______ can become an attack vector if an attacker can disrupt the supply chain.
Downgrade attack
______ is a type of attack that forces a system to downgrade its security
Security of Machine Learning Algorithms
______ use algorithms to learn the environment. If the attacker knew these algorithms, it would be easier for him to create attacks that trick the ML system.
Potentially Unwanted Programs (PUPs)
_______ are programs that a user may not want, even if a user consented to download it. Some of these unwanted programs are legitimate, but some are malicious.
Online Password Attacks
_______ attempts to discover a password from an online system. Attackers try to log to an account by repeatedly guessing the username and password.
Rootkit
_______ is a group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected/compromised by malicious code
Logic bombs
_______ is a string of code embedded into an application or script that will execute in response to an event
Plaintext Attack
_______ is possible if an attacker has some known ______ data and the ciphertext created from this _______.
Spyware
_______ is software installed on a user's system without their awareness or consent. It's purpose is to monitor the user's computer/activity.
Skimming
_______ is the practice of capturing credit card data at the point of sale.
Collision attack
_______ occurs when the hashing algorithm creates the same hash from different inputs
Card Cloning
_______ refers to making a copy of a credit card using data captured from a magnetic strip.
Dictionary attacks
_______ uses a list of words and attempts every combination of character and words to see if it works
Keyloggers
________ attempts to capture a user's keystrokes. Keystrokes are stored in a file and sent to attacker or saved until attacker retrieves it.
Malicious Universal Serial Bus (USB) Cable
________ has embedded Wi-Fi controller capable of receiving commands from nearby wireless devices
Spraying attacks
________ is an automated program that has a large list of targeted user accounts and uses multitude of passwords on the list until one matches.
Malicious Flash Drive
________ is one that includes malware configured to infect a computer when the drive is plugged in.
Backdoor
________ provides another way of accessing a system, similar to how a _______ in a house provides another method of entry.
Tainted Training Data for Machine Learning (ML)
________ to cause AI and ML systems to give inconsistent results.
Remote Access Trojan (RAT)
_________ is a type of malware that allows attackers to control systems from remote locations. Attackers can access infected computer at any time and install additional malware.