Malicious Attacks & Malware – Lecture Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

These vocabulary flashcards summarize the core terms, attack techniques, malware categories, historical examples, and key advantages/disadvantages discussed in the lecture on malicious attacks and security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Malicious Attack

A deliberate attempt to breach a system, network, or organization to cause harm, steal data, disrupt operations, or gain unauthorized access.

2
New cards

Intentional (Attack Characteristic)

Indicates the act is planned and purposeful, not accidental.

3
New cards

Unauthorized (Attack Characteristic)

The attacker lacks permission to access the targeted system or data.

4
New cards

Destructive (Attack Characteristic)

Involves deleting, corrupting, or exploiting data and resources once access is gained.

5
New cards

Phishing

A social-engineering attack that sends fake emails, texts, or calls posing as trusted sources to trick users into revealing sensitive information.

6
New cards

SQL Injection

An attack that inserts malicious SQL code into input fields to manipulate a database and access or modify data.

7
New cards

Birthday Attack

A cryptographic attack that exploits the birthday paradox to find hash collisions faster than brute force.

8
New cards

Birthday Paradox

Probability concept showing that in a group of 23 people there’s a high chance two share a birthday; foundation for birthday attacks.

9
New cards

Brute-Force Attack

Method of trying all possible passwords or keys until the correct one is found; guaranteed success but time-consuming.

10
New cards

Dictionary Attack

Password-cracking method that tests words from a pre-compiled list of common or meaningful passwords.

11
New cards

IP Addressing Attack

Hacking technique that exploits weaknesses tied to IP addresses, often masking the attacker’s true location with VPNs or proxies.

12
New cards

Spoofing

Act of falsifying data to impersonate another device or person to gain access, steal information, or distribute malware.

13
New cards

Hijacking (Session Hijack)

Taking control of a user’s active session or token to access accounts without credentials.

14
New cards

Replay Attack

Intercepting and resending valid data transmissions to trick a system into granting unauthorized access.

15
New cards

Man-in-the-Middle (MITM) Attack

An attacker secretly relays or alters communication between two parties who believe they are directly connected.

16
New cards

Masquerading

Impersonating a legitimate user, device, or system to bypass authentication and gain unauthorized privileges.

17
New cards

Eavesdropping (Sniffing)

Secretly intercepting and monitoring network traffic to collect sensitive data without altering it.

18
New cards

Social Engineering

Psychological manipulation of people to reveal confidential information or perform insecure actions.

19
New cards

Phreaking

Manipulating telephone systems (1960s-70s) with sound tones to make free calls or access restricted services.

20
New cards

Pharming

Redirecting users to fraudulent websites via DNS manipulation to harvest credentials—“phishing without a lure.”

21
New cards

Malware

Any software intentionally designed to harm, exploit, or disable computers, networks, or data.

22
New cards

Virus

Malware that attaches to legitimate files or programs and replicates when the host is run (e.g., ILOVEYOU).

23
New cards

Worm

Standalone malware that replicates across networks without a host file, often overloading systems (e.g., Morris Worm).

24
New cards

Trojan Horse

Malware disguised as legitimate software that, once installed, opens backdoors or steals data (e.g., Zeus).

25
New cards

Rootkit

Stealth toolset that hides malware and provides persistent privileged access while avoiding detection.

26
New cards

Spyware

Malware that secretly collects user data, keystrokes, or browsing habits without consent (e.g., CoolWebSearch).

27
New cards

Social Engineering Attack Category

Group of attacks exploiting human trust (e.g., phishing, text-scam) rather than technical vulnerabilities.

28
New cards

Wireless Network Attack

Exploits vulnerabilities in Wi-Fi or other wireless protocols to intercept data, set up rogue APs, or perform DoS (e.g., KRACK).

29
New cards

Web Application Attack

Targets flaws in website code—such as SQLi or XSS—to steal data or hijack accounts (e.g., Yahoo breach).

30
New cards

KRACK (Key Reinstallation Attack)

2017 WPA2 vulnerability allowing attackers within Wi-Fi range to decrypt and intercept supposedly secure traffic.

31
New cards

WannaCry

2017 ransomware outbreak that encrypted files on hundreds of thousands of systems and demanded Bitcoin payment.

32
New cards

ILOVEYOU Virus

Year-2000 email virus that overwrote files and caused over $10 billion in global damages.

33
New cards

Morris Worm

1988 worm that disrupted ARPANET, illustrating the power of self-replicating code.

34
New cards

Zeus Trojan

Banking Trojan (2007-2010) that stole online credentials, leading to large-scale financial theft.

35
New cards

Sony BMG Rootkit

2005 DRM software that secretly installed a rootkit on users’ PCs, sparking legal backlash.

36
New cards

CoolWebSearch

Early-2000s spyware that hijacked browsers, changed settings, and tracked users for ad revenue.

37
New cards

Access to Sensitive Data (Attacker Advantage)

Benefit where attackers obtain confidential information such as financial records or intellectual property.

38
New cards

Data Loss or Theft (Victim Disadvantage)

Primary harm of malicious attacks—confidential or personal data is stolen, deleted, or leaked.

39
New cards

Hash Collision

Situation where two different inputs produce the same hash value; exploited in birthday attacks.

40
New cards

MD5

Outdated hash function vulnerable to collisions, making it susceptible to birthday attacks.