cyberattacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

ransomware

a type of malware which destroys or encrypts data on a tar-
get system and then issues a notice to the user or admin
demanding payment for return of access to the files

2
New cards

worm

an executable which creates copies of itself to spread to new
systems or subsystems

3
New cards

DOS

a cyber-attack in which the perpetrator seeks to make a ma-
chine or network resource unavailable to its intended users
by temporarily or indefinitely disrupting services of a host
connected to a network

4
New cards

Poisoning

any of several types of attack in which data or resources are
corrupted by an attacker to force a target to redirect to a
desired location which will cause some form of damage, or
force a target to utilize weakened security mechanisms

5
New cards

virus

a piece of code which creates copies of itself by injecting ma-
licious code into an otherwise legitimate host executable and
modifying that host to execute the malicious code

6
New cards

baiting

he act of leaving malware-infected removable storage media
(CDs, etc.) in locations people will find them (bathrooms,
elevators, sidewalks, parking lots, etc.), and waiting for vic-
tims to infect themselves

7
New cards

trojan

a malware application which disguises itself as another ap-
plication or as an innocuous file

8
New cards

rootkit

a type of malware that hides itself and gains access within a protected space

9
New cards

spyware

a piece of code which is intended to track or log any kind
of usage of a device, or to activate any sensors which would
collect information about the user or environment around the
device, and exfil the gathered data to an attacker

10
New cards

waterholing

the act of poisoning some trusted source that is often used by a target organzation or user

11
New cards

phishing

the process of contacting a user and providing a pretext for
that user to engage in an activity which will compromise
their system or account access

12
New cards

eavesdropping

an attacker physically or logically placing himself in a lo-
cation where data relevant to one or more targets will be
accessible to the attacker