cyberattacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

cyberattack

is an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.

2
New cards

cyberattack

can target a wide range of victims from individual users to enterprises or even governments.

3
New cards

cyberattack

When targeting businesses or other organizations, the hacker's goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.

4
New cards

Malware

is any program or code that is created with the intent to do harm to a computer, network or server.

5
New cards

ransomware

an adversary encrypts a victim's data and offers to provide a decryption key in exchange for a payment.

6
New cards

ransomware

are usually launched through malicious links delivered via phishing emails, but unpatched vulnerabilities and policy misconfigurations are used as well.

7
New cards

Fileless malware

is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack.

8
New cards

Fileless malware

Unlike traditional malware, this does not require an attacker to install any code on a target's system, making it hard to detect.

9
New cards

Spyware

is a type of unwanted, malicious software that infects a computer or other device and collects information about a user's web activity without their knowledge or consent.

10
New cards

Adware

is a type of spyware that watches a user's online activity in order to determine which ads to show them

11
New cards

Adware

is not inherently malicious, it has an impact on the performance of a user's device and degrades the user experience.

12
New cards

trojan

is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads.

13
New cards

trojan

are installed through social engineering techniques such as phishing or bait websites.

14
New cards

The zeus trojan malware

a variant, has the goal accessing financial information and adding machines to a botnet.

15
New cards

worms

is a self-contained program that replicates itself and spreads its copies to other computers.

16
New cards

worms

may infect its target through a software vulnerability or it may be delivered via phishing or smishing.

17
New cards

worms

Embedded BLANK can modify and delete files, inject more malicious software, or replicate in place until the targeted system runs out of resources.

18
New cards

Rootkit

is a collection of software designed to give malicious actors control of a computer network or application.

19
New cards

Rootkit

Once activated, the malicious program sets up a backdoor exploit and may deliver additional malware. Bootkits take this a step further by infecting the master boot prior to the operating system booting up, making them harder to detect.

20
New cards

root

The name "rootkit derives from Unix and Linux operating systems, where the most privileged account admin is called the

21
New cards

kit

The applications which allow unauthorized root or admin-level access to the device are known as the

22
New cards

Mobile malware

is any type of malware designed to target mobile devices.

23
New cards

Mobile malware

is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi.

24
New cards

exploit

a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors

25
New cards

exploit

may be used to install more malware or steal data.

26
New cards

Scareware

tricks users into believing their computer is infected with a virus.

27
New cards

Scareware

This scare tactic aims to persuade people into installing fake antivirus software to remove the "virus." Once this fake antivirus software is downloaded, then malware may infect your computer.

28
New cards

keyloggers

are tools that record what a person types on a device.

29
New cards

keyloggers

While there are legitimate and legal uses for this, many uses are malicious. In this attack, the software records every keystroke on the victim’s device and sends it to the attacker.

30
New cards

botnet

is a network of computers infected with malware that are controlled by a bot herder

31
New cards

The bot herder

is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials, or execute CPU-intensive tasks.

32
New cards

Malicious malware (MALSPAM)

delivers malware as the malicious payload via emails containing malicious content, such as viruses or malware-infected attachments.

33
New cards

wiper attack

is designed to permanently delete or corrupt data on targeted systems.

34
New cards

wiper attack

They are often observed in geopolitical conflicts and in a hacktivism context.

35
New cards

Denial-of-Service (DoS) attack

is a malicious, targeted attack that floods a network with false requests in order to disrupt business operations.

36
New cards

Denial-of-Service (DoS) attack

users are unable to perform routine and necessary tasks, such as accessing email, websites, online accounts or other resources that are operated by a compromised computer or network

37
New cards

Denial-of-Service (DoS) attack

While most attacks do not result in lost data and are typically resolved without paying a ransom, they cost the organization time, money and other resources in order to restore critical business operations.

38
New cards

Denial of Service (DoS) attacks

originate from just one system

39
New cards

Distribted Denial of Service (DDoS) attacks

are launched from multiple systems.

40
New cards

Distributed Denial of Service (DDoS) attacks

are faster and harder to block than DOS attacks because multiple systems must be identified and neutralized to halt the attack.

41
New cards

Phishing

is a type of cyberattack that uses email, SMS, phone, social media, and social engineering techniques to entice a victim to share sensitive information such as passwords or account numbers or to download a malicious file that will install viruses on their computer or phone.