1/40
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
cyberattack
is an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.
cyberattack
can target a wide range of victims from individual users to enterprises or even governments.
cyberattack
When targeting businesses or other organizations, the hacker's goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.
Malware
is any program or code that is created with the intent to do harm to a computer, network or server.
ransomware
an adversary encrypts a victim's data and offers to provide a decryption key in exchange for a payment.
ransomware
are usually launched through malicious links delivered via phishing emails, but unpatched vulnerabilities and policy misconfigurations are used as well.
Fileless malware
is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack.
Fileless malware
Unlike traditional malware, this does not require an attacker to install any code on a target's system, making it hard to detect.
Spyware
is a type of unwanted, malicious software that infects a computer or other device and collects information about a user's web activity without their knowledge or consent.
Adware
is a type of spyware that watches a user's online activity in order to determine which ads to show them
Adware
is not inherently malicious, it has an impact on the performance of a user's device and degrades the user experience.
trojan
is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads.
trojan
are installed through social engineering techniques such as phishing or bait websites.
The zeus trojan malware
a variant, has the goal accessing financial information and adding machines to a botnet.
worms
is a self-contained program that replicates itself and spreads its copies to other computers.
worms
may infect its target through a software vulnerability or it may be delivered via phishing or smishing.
worms
Embedded BLANK can modify and delete files, inject more malicious software, or replicate in place until the targeted system runs out of resources.
Rootkit
is a collection of software designed to give malicious actors control of a computer network or application.
Rootkit
Once activated, the malicious program sets up a backdoor exploit and may deliver additional malware. Bootkits take this a step further by infecting the master boot prior to the operating system booting up, making them harder to detect.
root
The name "rootkit derives from Unix and Linux operating systems, where the most privileged account admin is called the
kit
The applications which allow unauthorized root or admin-level access to the device are known as the
Mobile malware
is any type of malware designed to target mobile devices.
Mobile malware
is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi.
exploit
a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors
exploit
may be used to install more malware or steal data.
Scareware
tricks users into believing their computer is infected with a virus.
Scareware
This scare tactic aims to persuade people into installing fake antivirus software to remove the "virus." Once this fake antivirus software is downloaded, then malware may infect your computer.
keyloggers
are tools that record what a person types on a device.
keyloggers
While there are legitimate and legal uses for this, many uses are malicious. In this attack, the software records every keystroke on the victim’s device and sends it to the attacker.
botnet
is a network of computers infected with malware that are controlled by a bot herder
The bot herder
is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials, or execute CPU-intensive tasks.
Malicious malware (MALSPAM)
delivers malware as the malicious payload via emails containing malicious content, such as viruses or malware-infected attachments.
wiper attack
is designed to permanently delete or corrupt data on targeted systems.
wiper attack
They are often observed in geopolitical conflicts and in a hacktivism context.
Denial-of-Service (DoS) attack
is a malicious, targeted attack that floods a network with false requests in order to disrupt business operations.
Denial-of-Service (DoS) attack
users are unable to perform routine and necessary tasks, such as accessing email, websites, online accounts or other resources that are operated by a compromised computer or network
Denial-of-Service (DoS) attack
While most attacks do not result in lost data and are typically resolved without paying a ransom, they cost the organization time, money and other resources in order to restore critical business operations.
Denial of Service (DoS) attacks
originate from just one system
Distribted Denial of Service (DDoS) attacks
are launched from multiple systems.
Distributed Denial of Service (DDoS) attacks
are faster and harder to block than DOS attacks because multiple systems must be identified and neutralized to halt the attack.
Phishing
is a type of cyberattack that uses email, SMS, phone, social media, and social engineering techniques to entice a victim to share sensitive information such as passwords or account numbers or to download a malicious file that will install viruses on their computer or phone.