2.4 Given a scenario, analyze indicators of malicious activity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Malware attacks

A category of malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

2
New cards

Ransomware

A type of malware that encrypts a user's files and demands a ransom payment to restore access.

3
New cards

Trojan

A type of malware disguised as legitimate software that tricks users into executing it.

4
New cards

Worm

A self-replicating malware that spreads across networks without human intervention.

5
New cards

Spyware

Malware that secretly monitors user activity and collects sensitive information.

6
New cards

Bloatware

Unwanted software that comes pre-installed on a device, consuming system resources.

7
New cards

Virus

A type of malware that attaches itself to legitimate programs and spreads to other files when executed.

8
New cards

Keylogger

A type of spyware that records keystrokes, capturing sensitive information like passwords.

9
New cards

Logic bomb

A piece of malicious code that triggers under certain conditions, causing harm to systems.

10
New cards

Rootkit

A type of malware that allows unauthorized access and control of a computer while hiding its presence.

11
New cards

Physical attacks

Attacks that involve tangible methods to compromise a system's security, such as tampering with hardware or using brute force.

12
New cards

Brute force

A method used to gain access by systematically trying all possible combinations of passwords or encryption keys until the correct one is found.

13
New cards

Radio Frequency Identification (RFID) cloning

The process of copying the data from an RFID tag to create a duplicate tag that can be used to gain unauthorized access.

14
New cards

Environmental attacks

Security breaches that exploit vulnerabilities related to physical environments, such as extreme temperatures or moisture that can

15
New cards

Network attacks

Attacks that focus on disrupting and compromising network resources and services.

16
New cards

Distributed denial-of-service (DDoS)

A type of attack where multiple compromised devices are used to flood a target with traffic, overwhelming it and making it unavailable.

17
New cards

Amplified DDoS attacks

A DDoS attack that uses amplification techniques to increase the volume of traffic sent to a target.

18
New cards

Reflected DDoS attacks

Attacks that exploit vulnerabilities in third-party servers to redirect traffic to a target, increasing its load.

19
New cards

Domain Name System (DNS) attacks

Attacks that compromise the domain name system to redirect users to malicious sites or disrupt services.

20
New cards

Wireless attacks

Security breaches that exploit vulnerabilities in wireless networks to gain unauthorized access or data.

21
New cards

On-path attacks

Attacks where an attacker intercepts communications between two parties, often to eavesdrop or alter the data.

22
New cards

Credential replay

An attack method where captured credentials are reused to gain unauthorized access to systems or accounts.

23
New cards

Malicious code

Software designed with harmful intent to disrupt, damage, or gain unauthorized access to computer systems.

24
New cards

Application Attacks

Malicious activities targeting software applications to exploit vulnerabilities.

25
New cards

Injection

An attack where an attacker inserts malicious code into a program or application to manipulate its behavior.

26
New cards

Buffer Overflow

An attack where more data is written to a buffer than it can hold, potentially leading to arbitrary code execution or system crashes.

27
New cards

Replay

An attack that involves capturing data sent over a network and then re-sending it to trick the system into performing an unauthorized action.

28
New cards

Privilege Escalation

An attack that allows an unauthorized user to gain elevated access to resources that are normally protected from the user.

29
New cards

Forged Requests

An attack where the attacker makes requests that appear to be from a legitimate source to manipulate the system.

30
New cards

Directory Traversal

An attack that allows an attacker to access files and directories that are stored outside the web document root.

31
New cards

Cryptographic Attack

A method aimed at exploiting weaknesses in cryptographic algorithms or protocols to gain unauthorized access to sensitive information.

32
New cards

Downgrade Attack

A type of cryptographic attack that forces a device to revert to an older, less secure version of a protocol, making it easier to exploit.

33
New cards

Collision Attack

A cryptographic attack that finds two different inputs that produce the same hash output, compromising the integrity of the hash function.

34
New cards

Birthday Attack

A type of collision attack that exploits the mathematics behind the birthday problem to find hash collisions more efficiently than brute force.

35
New cards

Spraying Password Attack

A method of password cracking where an attacker attempts to access multiple accounts using a common password, rather than targeting a single account with multiple passwords.

36
New cards

Brute Force Password Attack

An attack method where an attacker systematically attempts all possible combinations of passwords until the correct one is found.

37
New cards

Account lockout

A security feature that prevents further attempts to access an account after a specified number of failed login attempts.

38
New cards

Concurrent session usage

The use of a single account in multiple active sessions simultaneously, which can indicate potential unauthorized access.

39
New cards

Blocked content

Content that is restricted or unable to be accessed due to policies or security settings, often indicating suspicious activity.

40
New cards

Impossible travel

A behavioral indicator where a user is logged in from geographically distant locations in a short period of time, suggesting compromised credentials.

41
New cards

Resource consumption

Unusual or unexpected usage of system resources, which may indicate that a system is compromised or under a malicious attack.

42
New cards

Resource inaccessibility

The inability to access devices or data, potentially signifying that an attacker is attempting to restrict user access.

43
New cards

Out-of-cycle logging

Logs that are generated outside of the expected logging schedule, possibly indicating unauthorized activity on a system.

44
New cards

Published/documented

Indicators that are formally shared or disclosed, often through reports, pointing to known threats or vulnerabilities.

45
New cards

Missing logs

The absence of expected log data, which can indicate tampering or malicious activity aimed at concealing actions.