a type of malicious software that can spread to other computers and harm data and software
Virus
a type of malicious software that can monitor and control a computer without the user's consent
Spyware
prevents users from accessing their devices and data by encrypting files and demanding a payment for decryption
Ransomware
Surprise
Free points
aimed at 3rd part companies that are needed for day-to-day functioning
Supply-Chain Attacks
a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
Trojan
a type of malware or hardware that records the keys a user types on a keyboard
Keylogger
a type of ransomware that encrypts a device's files and demands a ransom payment to recover them(usually in form of cryptocurrency).
Crypto-malware
verifying the caller's id, looking up unknown numbers and being aware of pressure tactics used helps prevent against which common attack surface?
Voice/call-based attacks
when weak passwords are used or the credentials that come with a new device are not changed after purchase
Weak/Default Credentials
a type of malware that can replicate itself and spread across a network without a user's interaction
Worm
computer programs that can perform repetitive tasks automatically
Bot
a type of malware that prevents users from accessing their device by locking it, and then demands payment to restore access
Locker-ransomware
Changing the default password immediately when you purchase a new device helps defend against which?
Default/Weak Credentials
exploiting wired or wireless weaknesses in the internet to access and steal data, disrupt operations, or perform malicious actions
Network-based
a type of malicious code that's secretly inserted into a computer system or program to cause damage when certain conditions are met
Logic Bomb
gives a hacker remote control of an infected device or server
RAT (Remote Access Trojan)
a type of cyberattack that uses fear and anxiety
Scareware
Awareness of file sources, scanning files, using updated anti-malware applications and disabling macros helps defend against which common attack surface?
Image and File Based Attacks
user must install the software, usually unintentional or decieved
Client-Based
gaining access to a computer system, network, or software application without going through normal security procedures
Backdoor
a type of malware that gives cybercriminals access to a computer without being detected
Rootkit
type of malware that is used to extort victims by threatening to release sensitive information
Doxware
Upgrading immediately or isolating your systems from other systems with sensitive data is the best way to combat/prevent against which common attack surface?
Unsupported Systems/Applications
Do not require a user to install and can be zero-day attacks or exploit in popular or outdated software
Agentless