1.2 Indicators to type of attack

Ace your homework & exams now with Quizwiz!

Trojan

A ________, appears to be something useful but includes a malicious component, such as installing a backdoor on a user's system.

Worms

A ________, is a self-replicating malware that travels throughout a network without the assistance of a host application or user interaction. Resides in memory and can use different transport protocols to travel over the network.

Cryptomalware

Attackers encrypt the data on computers within the network to prevent access, then demand the user or organization pay a sum of money to regain access to data or computers

Ransomware

Attackers take control of computers or networks then demand that the user or organization pay a sum of money to regain access to the data or computers.

Command and Control

Attackers use _______ to control infected computers. _______ resources have commonly been used to control zombies within botnets

Bot/Botnets

Includes multiple computers that act as software ______ and function together in a network, often for malicious purposes. They will do the bidding of whoever controls the botnet.

Fileless Virus

_____ is a type of malicious software that runs in memory and often scripts that are injected into legitimate programs

Birthday Attack

______ an attacker attempts to create a password that produces the same hash as the user's actual password.

Rainbow Table

______ are a type of attack that attempts to discover the password from the hash. _______ is a huge database of passwords with precomputed hashes for each.

Offline Password Attacks

______ attempts to discover passwords from a captured database or captured packet scan.

Brute Force attacks

______ attempts to guess all possible character combinations

Supply Chain Risks

______ can become an attack vector if an attacker can disrupt the supply chain.

Downgrade attack

______ is a type of attack that forces a system to downgrade its security

Security of Machine Learning Algorithms

______ use algorithms to learn the environment. If the attacker knew these algorithms, it would be easier for him to create attacks that trick the ML system.

Potentially Unwanted Programs (PUPs)

_______ are programs that a user may not want, even if a user consented to download it. Some of these unwanted programs are legitimate, but some are malicious.

Online Password Attacks

_______ attempts to discover a password from an online system. Attackers try to log to an account by repeatedly guessing the username and password.

Rootkit

_______ is a group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected/compromised by malicious code

Logic bombs

_______ is a string of code embedded into an application or script that will execute in response to an event

Plaintext Attack

_______ is possible if an attacker has some known ______ data and the ciphertext created from this _______.

Spyware

_______ is software installed on a user's system without their awareness or consent. It's purpose is to monitor the user's computer/activity.

Skimming

_______ is the practice of capturing credit card data at the point of sale.

Collision attack

_______ occurs when the hashing algorithm creates the same hash from different inputs

Card Cloning

_______ refers to making a copy of a credit card using data captured from a magnetic strip.

Dictionary attacks

_______ uses a list of words and attempts every combination of character and words to see if it works

Keyloggers

________ attempts to capture a user's keystrokes. Keystrokes are stored in a file and sent to attacker or saved until attacker retrieves it.

Malicious Universal Serial Bus (USB) Cable

________ has embedded Wi-Fi controller capable of receiving commands from nearby wireless devices

Spraying attacks

________ is an automated program that has a large list of targeted user accounts and uses multitude of passwords on the list until one matches.

Malicious Flash Drive

________ is one that includes malware configured to infect a computer when the drive is plugged in.

Backdoor

________ provides another way of accessing a system, similar to how a _______ in a house provides another method of entry.

Tainted Training Data for Machine Learning (ML)

________ to cause AI and ML systems to give inconsistent results.

Remote Access Trojan (RAT)

_________ is a type of malware that allows attackers to control systems from remote locations. Attackers can access infected computer at any time and install additional malware.


Related study sets

Foreshadowing in "The Monkey's Paw"

View Set

Chapter 10-The Wechsler Intelligence Scales: WAIS-IV, WISC-V, and WPPSI-IV (Exam 2)

View Set

Unit 3, WE ARE FAMILY: Las familias de los verbos

View Set

Older Adults Chapter 14 NRS 101 EXAM 4

View Set

Aice US history Western Expansion and the Civil War

View Set

BIOL 2404 - CH 15 - Digestive System

View Set

unit 6 progress check: mcq ap spanish lang

View Set

Chapter 17 - end of chapter review questions

View Set

Custom: ATI assessment A Medical surgical II (April 3/23)

View Set

Self Check 6.3 History from 1877

View Set