2.4 Given a scenario, analyze indicators of malicious activity

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 44

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

45 Terms

1

Malware attacks

A category of malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

New cards
2

Ransomware

A type of malware that encrypts a user's files and demands a ransom payment to restore access.

New cards
3

Trojan

A type of malware disguised as legitimate software that tricks users into executing it.

New cards
4

Worm

A self-replicating malware that spreads across networks without human intervention.

New cards
5

Spyware

Malware that secretly monitors user activity and collects sensitive information.

New cards
6

Bloatware

Unwanted software that comes pre-installed on a device, consuming system resources.

New cards
7

Virus

A type of malware that attaches itself to legitimate programs and spreads to other files when executed.

New cards
8

Keylogger

A type of spyware that records keystrokes, capturing sensitive information like passwords.

New cards
9

Logic bomb

A piece of malicious code that triggers under certain conditions, causing harm to systems.

New cards
10

Rootkit

A type of malware that allows unauthorized access and control of a computer while hiding its presence.

New cards
11

Physical attacks

Attacks that involve tangible methods to compromise a system's security, such as tampering with hardware or using brute force.

New cards
12

Brute force

A method used to gain access by systematically trying all possible combinations of passwords or encryption keys until the correct one is found.

New cards
13

Radio Frequency Identification (RFID) cloning

The process of copying the data from an RFID tag to create a duplicate tag that can be used to gain unauthorized access.

New cards
14

Environmental attacks

Security breaches that exploit vulnerabilities related to physical environments, such as extreme temperatures or moisture that can

New cards
15

Network attacks

Attacks that focus on disrupting and compromising network resources and services.

New cards
16

Distributed denial-of-service (DDoS)

A type of attack where multiple compromised devices are used to flood a target with traffic, overwhelming it and making it unavailable.

New cards
17

Amplified DDoS attacks

A DDoS attack that uses amplification techniques to increase the volume of traffic sent to a target.

New cards
18

Reflected DDoS attacks

Attacks that exploit vulnerabilities in third-party servers to redirect traffic to a target, increasing its load.

New cards
19

Domain Name System (DNS) attacks

Attacks that compromise the domain name system to redirect users to malicious sites or disrupt services.

New cards
20

Wireless attacks

Security breaches that exploit vulnerabilities in wireless networks to gain unauthorized access or data.

New cards
21

On-path attacks

Attacks where an attacker intercepts communications between two parties, often to eavesdrop or alter the data.

New cards
22

Credential replay

An attack method where captured credentials are reused to gain unauthorized access to systems or accounts.

New cards
23

Malicious code

Software designed with harmful intent to disrupt, damage, or gain unauthorized access to computer systems.

New cards
24

Application Attacks

Malicious activities targeting software applications to exploit vulnerabilities.

New cards
25

Injection

An attack where an attacker inserts malicious code into a program or application to manipulate its behavior.

New cards
26

Buffer Overflow

An attack where more data is written to a buffer than it can hold, potentially leading to arbitrary code execution or system crashes.

New cards
27

Replay

An attack that involves capturing data sent over a network and then re-sending it to trick the system into performing an unauthorized action.

New cards
28

Privilege Escalation

An attack that allows an unauthorized user to gain elevated access to resources that are normally protected from the user.

New cards
29

Forged Requests

An attack where the attacker makes requests that appear to be from a legitimate source to manipulate the system.

New cards
30

Directory Traversal

An attack that allows an attacker to access files and directories that are stored outside the web document root.

New cards
31

Cryptographic Attack

A method aimed at exploiting weaknesses in cryptographic algorithms or protocols to gain unauthorized access to sensitive information.

New cards
32

Downgrade Attack

A type of cryptographic attack that forces a device to revert to an older, less secure version of a protocol, making it easier to exploit.

New cards
33

Collision Attack

A cryptographic attack that finds two different inputs that produce the same hash output, compromising the integrity of the hash function.

New cards
34

Birthday Attack

A type of collision attack that exploits the mathematics behind the birthday problem to find hash collisions more efficiently than brute force.

New cards
35

Spraying Password Attack

A method of password cracking where an attacker attempts to access multiple accounts using a common password, rather than targeting a single account with multiple passwords.

New cards
36

Brute Force Password Attack

An attack method where an attacker systematically attempts all possible combinations of passwords until the correct one is found.

New cards
37

Account lockout

A security feature that prevents further attempts to access an account after a specified number of failed login attempts.

New cards
38

Concurrent session usage

The use of a single account in multiple active sessions simultaneously, which can indicate potential unauthorized access.

New cards
39

Blocked content

Content that is restricted or unable to be accessed due to policies or security settings, often indicating suspicious activity.

New cards
40

Impossible travel

A behavioral indicator where a user is logged in from geographically distant locations in a short period of time, suggesting compromised credentials.

New cards
41

Resource consumption

Unusual or unexpected usage of system resources, which may indicate that a system is compromised or under a malicious attack.

New cards
42

Resource inaccessibility

The inability to access devices or data, potentially signifying that an attacker is attempting to restrict user access.

New cards
43

Out-of-cycle logging

Logs that are generated outside of the expected logging schedule, possibly indicating unauthorized activity on a system.

New cards
44

Published/documented

Indicators that are formally shared or disclosed, often through reports, pointing to known threats or vulnerabilities.

New cards
45

Missing logs

The absence of expected log data, which can indicate tampering or malicious activity aimed at concealing actions.

New cards

Explore top notes

note Note
studied byStudied by 1 person
808 days ago
5.0(1)
note Note
studied byStudied by 16 people
847 days ago
5.0(1)
note Note
studied byStudied by 30 people
704 days ago
5.0(1)
note Note
studied byStudied by 54 people
185 days ago
5.0(1)
note Note
studied byStudied by 181 people
919 days ago
5.0(2)
note Note
studied byStudied by 35 people
243 days ago
5.0(1)
note Note
studied byStudied by 3 people
51 days ago
5.0(1)
note Note
studied byStudied by 21 people
612 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (59)
studied byStudied by 3 people
147 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 10 people
549 days ago
5.0(1)
flashcards Flashcard (415)
studied byStudied by 6 people
631 days ago
4.0(2)
flashcards Flashcard (30)
studied byStudied by 5 people
701 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 117 people
371 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 29 people
423 days ago
5.0(2)
flashcards Flashcard (57)
studied byStudied by 17 people
707 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 35 people
32 minutes ago
5.0(1)
robot