Attack Types Study Set | Sociology 1.2 Terms & Definitions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:17 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

Malware

includes a wide range of software that has malicious intent. Installed on a system through devious means.

2
New cards

Ransomware

a type of malicious software designed to block access to a computer system until a sum of money is paid.

3
New cards

Trojans

typically looks like something beneficial, but it's actually something malicious. Can come as pirated software, a useful utility, or a game.

4
New cards

Worms

a self-replicating program able to propagate itself across a network, typically having a detrimental effect.

5
New cards

Potentially unwanted programs (PUPs)

Software that cannot definitively be classed as malicious, but may not have been chosen by or wanted by the user.

6
New cards

Fileless virus

a type of malicious software that runs in memory. Some techniques used are memory code injection, script-based techniques, and windows registry manipulation.

7
New cards

Command and Control

A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network

8
New cards

Bots

Software robots that function automatically. A botnet is a group of computers that are joined together. Attackers often use malware to join computers to a botnet, and then use the botnet to launch attacks.

9
New cards

Logic Bombs

A string of code embedded into an application or script that will execute in response to an event.

10
New cards

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

11
New cards

Keyloggers

software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

12
New cards

Remote Access Trojan (RATs)

a type of malware that allows attackers to control systems from remote locations. Often delivered by drive-by-downloads or malicious attachments in emails.

13
New cards

Rootkit

A set of programs that enables its user to gain administrator level access to a computer without the end user's consent or knowledge.

14
New cards

Backdoor

provides another way of accessing a system; bypass normal authentication methods; allow attackers to access systems from remote locations

15
New cards

Spraying

A Special type of brute force or dictionary attack designed to avoid being locked out.

16
New cards

Dictionary attack

A type of password attack that automates

password guessing by comparing encrypted passwords against a predetermined list of possible password values.

17
New cards

Brute Force attack

An attack on passwords or encryption that tries every possible password or encryption key.

18
New cards

offline attack

attempts to discover a password from a captured database or a captured packet scan.

19
New cards

Online attack

attempts to discover a password from an online system.

20
New cards

Rainbow table

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file.

21
New cards

Malicious USB cable

A USB cable embedded with a Wi-Fi controller that can receive commands from a nearby device to send malicious commands to the connected mobile device.

22
New cards

Malicious flash drive

a physical device that contains malicous PDFs, files, etc that could be harmful to your computer, older systems would automatically upload from this physical device without user consent

23
New cards

Card cloning

acquired information from a skimmer that can be made into a duplicate card, most commonly found when duplicating gift cards, can't duplicate chips, only magnetic strips

24
New cards

Skimming

capturing credit card data at the point of sale

25
New cards

Adversarial AI

Attempts to fool AI models by supplying it with deceptive input. When successful it can cause an error or malfunction in the AI model.

26
New cards

Tainted training data for machine learning

Providing bad data to a machine learning algorithm in order to force the algorithm to give inconsistent results

27
New cards

supply chain attacks

An attempt to exploit a weakness/vulnerability in the process that produces a service.

28
New cards

cloud-based vs on-premises attacks

Cloud: Offsite, usually managed by third party, lower cost, no data centers, limited downtime

On-premises attack: On-site, full control of data, system check can occur at anytime, high cost and time consumption

29
New cards

Birthday attack

A type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output.

30
New cards

Collision

When the encrypted hashes of two different strings are the same

31
New cards

downgrade attack

An attack in which the system is forced to abandon the current higher security mode of operation and fall back to implementing an older and less secure mode.