cyberattacks

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

12 Terms

1

ransomware

a type of malware which destroys or encrypts data on a tar-
get system and then issues a notice to the user or admin
demanding payment for return of access to the files

New cards
2

worm

an executable which creates copies of itself to spread to new
systems or subsystems

New cards
3

DOS

a cyber-attack in which the perpetrator seeks to make a ma-
chine or network resource unavailable to its intended users
by temporarily or indefinitely disrupting services of a host
connected to a network

New cards
4

Poisoning

any of several types of attack in which data or resources are
corrupted by an attacker to force a target to redirect to a
desired location which will cause some form of damage, or
force a target to utilize weakened security mechanisms

New cards
5

virus

a piece of code which creates copies of itself by injecting ma-
licious code into an otherwise legitimate host executable and
modifying that host to execute the malicious code

New cards
6

baiting

he act of leaving malware-infected removable storage media
(CDs, etc.) in locations people will find them (bathrooms,
elevators, sidewalks, parking lots, etc.), and waiting for vic-
tims to infect themselves

New cards
7

trojan

a malware application which disguises itself as another ap-
plication or as an innocuous file

New cards
8

rootkit

a type of malware that hides itself and gains access within a protected space

New cards
9

spyware

a piece of code which is intended to track or log any kind
of usage of a device, or to activate any sensors which would
collect information about the user or environment around the
device, and exfil the gathered data to an attacker

New cards
10

waterholing

the act of poisoning some trusted source that is often used by a target organzation or user

New cards
11

phishing

the process of contacting a user and providing a pretext for
that user to engage in an activity which will compromise
their system or account access

New cards
12

eavesdropping

an attacker physically or logically placing himself in a lo-
cation where data relevant to one or more targets will be
accessible to the attacker

New cards
robot