Cybersecurity Threats and Defense Strategies: Key Virus Types, Attacks, and Business Continuity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

113 Terms

1
New cards

Adware

Adware displays pop-up advertisements to users based on their activities, URLs they have visited, applications that have accessed, and so on.

2
New cards

Virus

Viruses are programs designed to spread from one system to another through self-replication and to perform a wide range of malicious activities.

3
New cards

Polymorphic viruses

Polymorphic viruses have the ability to alter their own code in order to avoid detection by antivirus scanners.

4
New cards

Macro viruses

Macro viruses live within documents or emails and exploit the scripting capabilities of productivity software.

5
New cards

Stealth viruses

Stealth viruses attempt to avoid detection by masking or hiding their activities.

6
New cards

Armored viruses

Armored viruses are designed to be difficult to detect and remove.

7
New cards

Retroviruses

Retroviruses specifically target antivirus systems to render them useless.

8
New cards

Phage viruses

Phage viruses modify or infect many aspects of the system so they can generate themselves from any remaining on remote parts.

9
New cards

Companion virus

A companion virus borrows the root filename of the common executable and then gives itself the .com extension in an attempt to get itself launched rather than the intended application.

10
New cards

Worms

A worm is malicious software that travels throughout a network without the assistance of a host application or user interaction.

11
New cards

Spyware

Spyware is software that is installed on a user's system without her awareness or consent, often to take control over the user's computer.

12
New cards

Trojan

A Trojan horse is a form of malicious software that is disguised as something useful or legitimate.

13
New cards

Root kits

A root kit is a group of programs that hides the fact that the system has been infected or compromised by malicious code.

14
New cards

Backdoors

The term backdoor can refer to a developer installed access method that bypasses security restrictions or a hacker installed remote access client.

15
New cards

Logic bomb

A logic bomb is a form of malicious code that remains dormant until a triggering event occurs.

16
New cards

Botnets

A botnet is a network of robots or malicious software agents controlled by a hacker to launch massive attacks against targets.

17
New cards

DoS (denial of service)

A denial-of-service attack is intended to make a computer's resources or services unavailable to users.

18
New cards

SYN Flood Attack

The SYN Flood attack disrupts the TCP initiation process by withholding the third packet of the TCP three-way handshake.

19
New cards

Smurf attack

In a Smurf attack, the attacker sends ICMP broadcast to a network with a false IP address, overloading the victim with ICMP responses.

20
New cards

DDoS (distributed denial of service)

A DDoS attack includes multiple attacking computers, often part of a botnet, to overwhelm a target.

21
New cards

Spoofing

Spoofing is where one person or entity impersonates or masquerades as something else, often modifying the source IP address.

22
New cards

Man-in-the-middle

A man-in-the-middle attack is an eavesdropping attack where attackers position themselves in the communication stream between a client and server.

23
New cards

Replay attacks

A replay attack involves capturing network traffic and then replaying that traffic to gain unauthorized access to a system.

24
New cards

TCP/IP hijacking

TCP/IP hijacking is where a third party takes over a session and logically disconnects a client that was originally involved.

25
New cards

Shoulder surfing

Shoulder surfing occurs when someone watches your keyboard or display to learn your password or confidential information.

26
New cards

Dumpster diving

Dumpster diving is the act of digging through trash to obtain information about a target organization or individual.

27
New cards

Impersonations

Impersonation is the act of taking on the identity of someone else.

28
New cards

Phishing

Phishing is the practice of sending unwanted email to trick users into revealing personal information or clicking on a link.

29
New cards

Spear phishing

Spear phishing is a targeted form of phishing where the message is crafted specifically for an individual or group.

30
New cards

Whaling

A form of fishing that targets specific high-value targets and sends messages tailored to their needs.

31
New cards

Vishing

Fishing done over VoIP technology.

32
New cards

Piggybacking or tailgating

A practice of one person following closely behind another without showing credentials.

33
New cards

Pharming

A malicious redirection of a valid website's URL or IP address to a fake website.

34
New cards

Hoaxes

A form of social engineering designed to convince targets to perform actions that reduce their IT security.

35
New cards

The Melissa Virus

A computer virus that tempts recipients into opening a document, replicating itself to the top 50 people in the recipient's email address book.

36
New cards

ILOVEYOU

A standalone program worm that replicated itself, causing an estimated $10 billion in damages.

37
New cards

Code Red

A worm that exploited a flaw in Microsoft Internet Information Server, bringing down websites including whitehouse.gov.

38
New cards

Nimda

A worm targeting Internet servers that created a backdoor into the victim's operating system.

39
New cards

MYDoom

The most destructive computer virus in history, spreading through emails and carrying two payloads: a backdoor and a DDoS attack.

40
New cards

Sasser

A worm that used RPC Exploit to infect Windows machines without requiring human intervention.

41
New cards

Storm

A worm that infected computers through email and forced them to join a Botnet.

42
New cards

Grayware

Encompasses spyware, adware, dialers, joke programs, remote access tools, and other unwelcome files designed to harm computer performance.

43
New cards

Disasters

Can include natural disasters like hurricanes and earthquakes, as well as fires, attacks, and hardware/software failures.

44
New cards

Business continuity

Processes and policies that minimize the impact of system or network failures.

45
New cards

Business continuity planning (BCP)

A process of implementing policies to counteract the effects of losses or failures of critical business processes.

46
New cards

Business Impact Analysis (BIA)

Identifies critical functions, prioritizes them, and estimates the impact on the organization.

47
New cards

Quantitative Risk Assessment

Measures risk using specific monetary amounts to prioritize risks.

48
New cards

Qualitative Risk Assessment

Categorizes risks based on probability and impact using terms like low, medium, and high.

49
New cards

Single Point of Failure

Any single component whose failure could cause the entire system to fail.

50
New cards

High Availability

The process of keeping services operational during an outage, aiming for 99.999% availability.

51
New cards

Redundancy

Systems that are duplicated or fail over to other systems in the event of a malfunction.

52
New cards

Fail-over

The process of reconstructing a system or switching over to other systems when a failure is detected.

53
New cards

Fault Tolerance

The ability of a system to sustain operations in the event of a component failure.

54
New cards

Spare Parts

Key components that should be available for fault tolerance.

55
New cards

Uninterruptible Power Supply (UPS)

A device that allows you to continue to function in the absence of power for only a short duration.

56
New cards

Backup Generator

A generator that runs off of gasoline, propane, natural gas, or diesel and can generate the electricity needed to provide steady power.

57
New cards

Redundant Array of Independent Disks (RAID)

RAID disks increase performance and provide fault tolerance for disks.

58
New cards

RAID-0

Does not provide any redundancy or fault tolerance; it is disk striping that results in increased reading and writing performance.

59
New cards

RAID-1

Disk mirroring where everything stored on one drive is also stored on the other, providing 100% redundancy.

60
New cards

RAID-3

Disk striping with a parity disk; common in older systems and supported by most UNIX systems.

61
New cards

RAID-5

Disk striping with distributed parity; one of the most common forms of RAID in use today.

62
New cards

RAID-10

Combines RAID-1 and RAID-0, first striping the data then mirroring it.

63
New cards

Hot Site

Operational 24/7, can take over functionality from a primary site within minutes of failure.

64
New cards

Cold Site

Has basic infrastructure but requires equipment and data to be brought in and enabled.

65
New cards

Warm Site

A compromise between a hot site and a cold site, providing systems and media capabilities.

66
New cards

Working Copies

Partial or full backups kept for immediate recovery purposes.

67
New cards

On-site Storage

A location on the site of the computer center used to store information locally.

68
New cards

Off-site Storage

A location away from the computer center where paper copies and backup media are kept.

69
New cards

Disaster Recovery Plan

A plan focused on reestablishing services and minimizing losses, including redundancy solutions and backups.

70
New cards

Full Backup

A complete, comprehensive backup of all files on a disk or server.

71
New cards

Incremental Backup

A partial backup that stores only the information that has changed since the last full or incremental backup.

72
New cards

Differential Backup

Backs up any files altered since the last full backup, making duplicate copies of unchanged files since the last differential backup.

73
New cards

Class A Fire

Ordinary combustibles including wood, paper, cloth, rubber, trash, and plastics.

74
New cards

Class B Fire

Flammable liquids including gasoline, propane, solvents, oil, paint, and other synthetic or oil-based products.

75
New cards

Class C Fire

Electrical equipment fires, fought by displacing oxygen or disrupting the fire's chain reaction.

76
New cards

Class D Fire

Combustible metals such as magnesium, lithium, titanium, and sodium.

77
New cards

HVAC

Heating, ventilation, and air conditioning systems important for environmental control in computer environments.

78
New cards

Confidentiality

Implemented to prevent the unauthorized disclosure of data through methods such as authentication, access controls, and cryptography.

79
New cards

Integrity

Implemented to verify that data is not modified, tampered, or corrupted, enforced by hashing.

80
New cards

Availability

Data and services must be available when needed, achieved through redundancies and backups.

81
New cards

Non-repudiation

Provides definitive proof of a sender's identity to prevent denial of a specific action.

82
New cards

Implicit Deny

Indicates that unless something is specifically allowed, it is denied.

83
New cards

Three Factors of Authentication

Something you know (username/password), something you have (smart cards), and something you are (fingerprint, biometrics).

84
New cards

Identification vs. Authentication

Identification is verifying someone's identity, while authentication is providing credentials to the authenticator.

85
New cards

Multifactor Authentication

When two or more access methods are included in the authentication process.

86
New cards

Kerberos

The authentication mechanism used in domains and UNIX realms, requiring a key distribution center (KDC) to issue time-stamped tickets.

87
New cards

Remote Access Authentication

Authentication used when a user accesses a private network from outside the network.

88
New cards

PAP

Password authentication protocol used in point to point protocol (PPP) to authenticate clients.

89
New cards

CHAP

Challenge handshake authentication protocol that uses a handshake process where the server challenges the client with a nonce.

90
New cards

MS-CHAP

Microsoft's implementation of CHAP, dedicated to most clients only.

91
New cards

MS-CHAPv2

An improvement over MS-CHAP that includes the ability to perform mutual authentication.

92
New cards

RADIUS

Remote authentication dial-in user service, a decentralized authentication service.

93
New cards

TACACS/TACACS+

Cisco's alternatives to RADIUS that use port 49.

94
New cards

Mandatory Access Control (MAC)

A model that uses sensitivity labels for users and data with predefined access privileges.

95
New cards

Discretionary Access Control (DAC)

A model where every object has an owner who has full explicit control of the object.

96
New cards

Role and Rule-Based Access Control (RBAC)

A model that uses roles to grant access based on assigned jobs, functions, or tasks.

97
New cards

Mantraps

A physical security method that creates a buffer zone to a secure area.

98
New cards

Hardware Security

Involves adding cable locks to computers to prevent theft.

99
New cards

Video Surveillance

Security cameras used to monitor situations and aid in investigations.

100
New cards

Environmental Monitoring

Humidity control to protect electronic components from damage.