Virus/Worms
Spyware/Adware
Ransomware Types
Defense Mechanisms
Types of Attack Surfaces
100

a type of malicious software that can spread to other computers and harm data and software

Virus

100

a type of malicious software that can monitor and control a computer without the user's consent

Spyware

100

prevents users from accessing their devices and data by encrypting files and demanding a payment for decryption

Ransomware

100

Surprise

Free points

100

aimed at 3rd part companies that are needed for day-to-day functioning

Supply-Chain Attacks

200

a type of malware that disguises itself as a legitimate program or file to gain access to a computer system

Trojan

200

a type of malware or hardware that records the keys a user types on a keyboard

Keylogger

200

a type of ransomware that encrypts a device's files and demands a ransom payment to recover them(usually in form of cryptocurrency).

Crypto-malware

200

verifying the caller's id, looking up unknown numbers and being aware of pressure tactics used helps prevent against which common attack surface?

Voice/call-based attacks

200

when weak passwords are used or the credentials that come with a new device are not changed after purchase

Weak/Default Credentials

300

a type of malware that can replicate itself and spread across a network without a user's interaction

Worm

300

computer programs that can perform repetitive tasks automatically

Bot

300

a type of malware that prevents users from accessing their device by locking it, and then demands payment to restore access 

Locker-ransomware

300

Changing the default password immediately when you purchase a new device helps defend against which?

Default/Weak Credentials

300

exploiting wired or wireless weaknesses in the internet to access and steal data, disrupt operations, or perform malicious actions

Network-based

400

a type of malicious code that's secretly inserted into a computer system or program to cause damage when certain conditions are met

Logic Bomb

400

gives a hacker remote control of an infected device or server

RAT (Remote Access Trojan)

400

a type of cyberattack that uses fear and anxiety

Scareware

400

Awareness of file sources, scanning files, using updated anti-malware applications and disabling macros helps defend against which common attack surface?

Image and File Based Attacks

400

user must install the software, usually unintentional or decieved

Client-Based

500

gaining access to a computer system, network, or software application without going through normal security procedures

Backdoor

500

a type of malware that gives cybercriminals access to a computer without being detected

Rootkit

500

type of malware that is used to extort victims by threatening to release sensitive information

Doxware

500

Upgrading immediately or isolating your systems from other systems with sensitive data is the best way to combat/prevent against which common attack surface?

Unsupported Systems/Applications

500

Do not require a user to install and can be zero-day attacks or exploit in popular or outdated software

Agentless

M
e
n
u