2.0 Threats, Vulnerabilities, and Mitigations

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 135

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

136 Terms

1
  • Nation-state

  • These threat actors often have the support of governments. Their activities, including cyber espionage, are typically motivated by strategic or political reasons. They have the advanced capabilities, significant resources, and strategic motivations to carry out the sophisticated, long-term attack the financial institution discovered.

New cards
2
  • Hacker

  • Not necessarily a threat actor but they have the skills to gain access to computer systems through unauthorized or unapproved means. The term is sometimes associated with illegal or malicious system intrusion.

New cards
3

Unskilled Attacker

  • Definition: A hacker with little technical knowledge who relies on pre-made tools or scripts to launch attacks.

  • Example: A beginner hacker uses a phishing kit downloaded online to steal login credentials.

New cards
4
  • Hacktivist

  • A threat actor that uses cyber weapons to promote a political agenda. They can attempt to obtain and release confidential information to the public domain, perform denial-of-service (DoS) attacks, or deface websites.

New cards
5
  • Insider threat

  • Threat actors that are employees who harbor grievances or perpetrate fraud a potential risk posed by individuals with inside information about the company's security practices, data, and computer systems.. For example, an insider threat might plan and execute a campaign to modify invoices and divert funds.

New cards
6

Organized Crime

  • Definition: Cybercriminal groups that operate like businesses, often engaging in ransomware attacks, fraud, and identity theft for financial gain.

  • Example: A cyber gang deploys ransomware on hospital networks and demands payment to unlock patient records.

New cards
7
  • Shadow IT

  • refers to hardware, software, and services used within an organization without explicit approval from the IT department

New cards
8
  • Internal Threats

  • A security risk that comes from within an organization, such as employees or contractors.

    Example: A disgruntled employee leaks confidential files to a competitor.

New cards
9

External Threat

A security risk from outside the organization, such as hackers or nation-states.

  • Example: A hacker group launches a DDoS attack against a company’s website.

New cards
10
  • Resources/funding

  • Definition: The money, tools, and infrastructure available to a threat actor to conduct attacks.

  • Example: A nation-state attacker has government funding to develop advanced malware for espionage.

New cards
11
  • Level of sophistication/capability

  • consider an adversaries' sophistication and level of resources and funding. A targeted attack might use highly sophisticated tools backed by a budget that can allocate physical and human resources.

New cards
12
  • Opportunistic

  • attack might launch without much sophistication or funding, simply by using tools widely available on the Internet.

New cards
13
  • Data exfiltration

  • Definition: The unauthorized transfer of sensitive data from a system.

    Example: A hacker steals customer credit card information from an online store and sells it on the dark web.

New cards
14
  • Espionage

  • characterized by stealthy, long-term breaches, aims at acquiring secret information, often for strategic advantage. The intruders' focus on the proprietary designs and their ability to remain undetected aligns with this motivation.

New cards
15
  • Service disruption

  • Definition: Any event that prevents a system, application, or network from functioning properly.

    Example: A DDoS attack floods a company’s website with traffic, making it unreachable for customers.

New cards
16
  • Blackmail

  • Definition: Threatening to release sensitive data or take harmful action unless demands are met.

  • Example: A hacker steals private emails from a CEO and demands money to keep them secret.

New cards
17
  • Financial gain

  • involves monetary gain through methods such as blackmail, extortion, or fraud, the primary goal in this scenario is acquiring proprietary information, not explicit financial gain.

New cards
18
  • Philosophical/political beliefs

  • typically involve strategic objectives to bring about change or achieve specific goals, often at a societal or governance level, moral.

New cards
19
  • Ethical

  • Definition: Security professionals who use hacking techniques legally to find and fix vulnerabilities.

  • Example: A company hires an ethical hacker to test its security before a cybercriminal can exploit weaknesses.

New cards
20
  • Revenge

  • typically involve a disgruntled individual seeking retaliation. This scenario does not provide evidence of a personal grievance or individual retaliation.

New cards
21
  • Disruption/chaos

  • disrupt for its own sake, often as an act of vandalism or to sow chaos.

New cards
22

War

Definition: Cyberattacks launched by one country against another to cause disruption or gain intelligence.

Example: A nation-state hacks into a rival country’s power grid, causing blackouts.

New cards
23

Email-Based Attacks (Phishing)

  • Definition: Cyberattacks that use fraudulent emails to trick users into revealing sensitive information or downloading malware.

  • Example: A hacker sends an email pretending to be a bank, asking the recipient to click a fake login link to steal their credentials.

New cards
24
  • Short Message Service (SMS)

  • Definition: Social engineering attacks that use fake text messages to deceive users into taking harmful actions.

  • Example: A scammer sends a text message claiming to be from a delivery company, with a fake tracking link that installs malware.

New cards
25
  • Instant messaging (IM)

  • Definition: Cyber threats targeting messaging apps like WhatsApp, Telegram, or Slack to spread malware or steal data.

  • Example: A hacker sends a malicious link through WhatsApp, tricking users into downloading spyware onto their phones.

New cards
26

Image-basedDefinition: Cyberattacks that exploit vulnerabilities in files like PDFs, Word documents, or spreadsheets.

  • Example: A victim opens an infected PDF, allowing a hacker to install spyware on their computer.

  • Definition: Attacks that hide malicious code within images.

  • Example: A phishing email contains an infected image, and when clicked, it installs malware.

New cards
27

File-based

  • Definition: Cyberattacks that exploit vulnerabilities in files like PDFs, Word documents, or spreadsheets.

  • Example: A victim opens an infected PDF, allowing a hacker to install spyware on their computer.

New cards
28

Voice Call Attacks (Vishing)

  • Definition: Social engineering attacks conducted over the phone to trick people into giving up sensitive information.

  • Example: A scammer calls a bank employee, pretending to be the IT department and asking for login credentials.

New cards
29

Removable Device Threats

  • Definition: Cyber risks associated with USB drives, external hard drives, and other portable storage devices.

  • Example: A hacker leaves infected USB drives in a company parking lot, hoping employees plug them into work computers.

New cards
30
  • Client-Based Security (Agent-Based)

  • Definition: Requires installing a software agent on a device to provide security features such as monitoring, threat detection, and enforcement.

  • Example: A company installs endpoint protection software on employee laptops to detect malware in real-time.

New cards
31
  • Agentless Security

  • Definition: Provides security without requiring software installation on the end device, often working through network-based scanning or cloud integration.

  • Example: A cloud security service monitors all devices accessing a network without installing software on each one.

New cards
32
  • Wireless/Cloud Network Vector Attack

  • attack targets cloud-based services by exploiting vulnerabilities or misconfigurations to gain unauthorized access but does not include transmitting malicious files to a user's device.

New cards
33
  • Wired Network Vector Attack

  • a threat actor gains access to the site. He attaches an unauthorized device to a physical network port, permitting the device to communicate with other hosts.

New cards
34
  • Bluetooth Network Attack

  • the threat actor exploits vulnerabilities or misconfigurations in the Bluetooth protocol to transmit a malicious file to a user's device.

New cards
35

Open service ports

  • Definition: Network ports that are left open and accessible, potentially exposing a system to unauthorized access or attacks.

  • Example: A company leaves port 3389 (Remote Desktop Protocol) open, allowing hackers to attempt brute-force attacks on remote connections.

New cards
36

Default credentials

  • Definition: Pre-set usernames and passwords that come with devices or software, which attackers can easily guess or find online.

  • Example: A router still uses the factory-set "admin/admin" login, making it vulnerable to unauthorized access.

New cards
37
  • Managed service providers (MSPs)

  • Definition: Third-party companies that remotely manage IT services, such as security, networking, and cloud computing, for businesses.

    Example: A small business hires an MSP to handle its cybersecurity, ensuring firewalls and antivirus software stay updated.

New cards
38
  • Vendors

  • Definition: Companies or individuals that sell products or services to an organization, often including software, hardware, or cloud solutions.

    Example: A company purchases antivirus software from a security vendor to protect employee computers.

New cards
39
  • Suppliers

  • Definition: Businesses that provide raw materials, hardware, or components needed for a company's operations.

    Example: A computer manufacturer relies on a supplier for processors used in its laptops.

New cards
40
  • Supply Chain Attack

  • involves a threat actor seeking methods to infiltrate a company in its supply chain.

New cards
41

Phishing

  • Definition: A cyberattack where attackers send fake emails or messages pretending to be from a trusted source to steal sensitive information.

  • Example: A hacker sends an email pretending to be from a bank, asking the recipient to enter their password on a fake website.

New cards
42
  • Spear Phishing

  • a phishing scam where the attacker has some information that is more likely to fool an individual target by the attack.

New cards
43
  • Whaling (Targeted Phishing)

  • a type of spear phishing attack explicitly directed against the upper levels of management in an organization.

New cards
44
  • Vishing

  • a phishing attack conducted through a voice channel, such as a phone call or VOIP

New cards
45
  • Smishing

  • a phishing technique that uses simple message service (SMS) text communications as the attack vector. The text message may include a link to a fake website asking a user to log in.

New cards
46
  • SPIM

  • spam (or mass unsolicited messages) over instant messaging or Internet messaging services.

New cards
47
  • Misinformation/disinformation

  • False or misleading information shared unintentionally.

  • Disinformation: False information deliberately spread to deceive people.

  • Example: A hacker spreads fake news about a company's data breach to damage its reputation.

New cards
48
  • Impersonation

  • Definition: When an attacker pretends to be someone else to gain trust and trick victims into revealing information or taking action.

    Example: A scammer calls an employee, pretending to be IT support and asking for login credentials.

New cards
49
  • Business email compromise

  • Definition: A targeted phishing attack where cybercriminals impersonate company executives or vendors to trick employees into transferring money or sensitive data.

  • Example: A hacker spoofs the CEO’s email and requests the finance department to wire money to a fraudulent account.

New cards
50
  • Pretexting

  • a type of social engineering attack that involves a situation, or pretext, created by an attacker in order to lure a victim into a vulnerable situation and to trick them into giving private information, specifically information that the victim would typically not give outside the context of the pretext.

New cards
51
  • Watering hole

  • a social engineering technique where the attacker identifies a popular and frequently visited website used by the target group and compromises that website with exploit code. Their computers become infected when target group members visit the website, and the attacker can then use this foothold to penetrate the organization's systems.

New cards
52
  • Brand impersonation

  • committing resources to accurately duplicate a company's logos and formatting to make a phishing message or pharming website a visually compelling fake, associated with pharming

New cards
53
  • Pharming

  • Redirecting users from legitimate websites to malicious ones by corrupting the victim's computer's name resolution process. It is not specific to targeting a group of individuals.

New cards
54
  • Typosquatting

  • registers domains like legitimate ones, making users believe they're accessing a trusted site. The attacker creates a hijacked subdomain using the primary domain of a trusted cloud provider. Employees may fall victim to this attack if they overlook minor differences.

New cards
55
  • Memory injection

  • refers to a security flaw where an attacker can introduce or inject malicious code into a running application's process memory.

New cards
56
  • Buffer overflow

  • occurs when an application receives more data than it can process, which can cause the application to crash or allow an attacker to execute arbitrary code, the attacker passes data that deliberately flood a temporary memory space.

New cards
57
  • Race conditions

  • Application race condition vulnerabilities refer to software flaws associated with the timing or order of events within a software program

New cards
58
  • Time-of-check (TOC) (RACE CONDITION)

  • Refers to the moment when a system checks a condition or a state (e.g., verifying user permissions or file access).

  • Example: A program checks if a user has permission to access a file.

New cards
59
  • Time-of-use (TOU)

RACE CONDITION

  • Refers to the moment when the system acts based on the result of the check (e.g., granting or denying access).

  • Example: The program opens the file after confirming the user's permission

New cards
60
  • TOC/TOU Vulnerability

  • A TOC/TOU vulnerability occurs when there's a time gap between the "check" and the "use," during which an attacker can manipulate the system or change the state.

  • Example Attack Scenario:

    • A program checks if a file is safe to open (TOC).

    • Before the file is used (TOU), an attacker swaps the file with a malicious one

New cards
61
  • Malicious update

  • an update that appears legitimate but contains harmful code, often used by cyber criminals to distribute malware or execute a cyber attack.

New cards
62
  • Structured Query Language injection (SQLi)

  • Definition: A type of attack where an attacker injects malicious SQL code into a web application’s database query to manipulate or steal data.

  • Example: A hacker enters '; DROP TABLE users; -- into a website’s login form, which deletes the user database if the input is not properly secured.

New cards
63
  • Cross-site scripting (XSS)

  • Definition: An attack where an attacker injects malicious scripts into a trusted website, which then executes in a victim’s browser, allowing data theft or unauthorized actions.

  • Example: A hacker posts a malicious JavaScript snippet in a website's comment section, which steals login cookies when other users view the page.

New cards
64
  • Firmware

  • instances where processors inside the computer allow malicious programs to steal data during processing.

New cards
65
  • End-of-life

  • (EOL) system vulnerability includes instances where a specific product or version of a product that the manufacturer or vendor publicly declares as no longer supported.

New cards
66
  • Legacy

  • typically describe outdated software methods, technology, computer systems, or application programs with continued use despite known shortcomings.

New cards
67
  • Virtual machine (VM) escape

  • when an attacker with access to a VM breaks out of this isolated environment and gains access to the host system or other VMs running on the same host.

New cards
68
  • Resource reuse

Definition:

Resource reuse occurs when system components, such as memory, storage, or hardware, are not properly cleared or reset before being reassigned. This can lead to security risks, such as data leaks or unauthorized access.

Example:

A cloud provider fails to wipe virtual machine storage before reassigning it to a new customer, potentially exposing the previous user's sensitive data.

New cards
69
  • Secure deallocation

  • takes any residual data in a resource (memory, disk space, etc.) and cleans or overwrites it before reuse, preventing potential data leakage.

New cards
70

Service Provider

  • Definition: A company that offers IT, cloud, or network services to businesses and consumers.

  • Example: AWS (Amazon Web Services) provides cloud computing services to companies for hosting websites and applications.

New cards
71
  • Hardware provider

  • Definition: A company that supplies physical devices such as servers, computers, or networking equipment.

  • Example: Dell manufactures and sells laptops, desktops, and enterprise servers.

New cards
72
  • Software provider

  • Definition: A company that develops and distributes software applications for businesses or consumers.

  • Example: Microsoft provides the Windows operating system and Office productivity tools.

New cards
73

Side Loading

  • Definition: Installing applications from unofficial sources instead of the official app store.

  • Example: A user downloads an app from an unverified website, which secretly installs malware.

New cards
74

Zero-Day

  • Definition: A newly discovered software vulnerability that has no fix yet, making it a prime target for cyberattacks.

  • Example: A hacker exploits a zero-day vulnerability in a web browser before the software vendor releases a patch.

New cards
75

Jailbreaking

  • Definition: Removing software restrictions on a device to install unauthorized apps and modifications.

  • Example: A user jailbreaks their iPhone to install apps not available in the App Store, increasing security risks.

New cards
76
  • Ransomware

  • a type of malware that tries to extort money from the victim by making the victim’s computer or data files unavailable, demanding payment before making them available again.

New cards
77
  • Trojan

  • malware concealed within an installer package for software that appears legitimate. They misrepresent themselves to appear useful, routine, or interesting to persuade a victim to install them This type of malware does not seek consent for installation and actively operates secretly.

New cards
78
  • Worm

  • one of the first types of malware that spreads without any authorization from the user. An executable code of another process conceals a worm.

New cards
79
  • Spyware

  • malware that can perform adware-like tracking, but it also monitors local application activity, takes screenshots, and activates recording devices, such as a microphone or webcam.

New cards
80
  • Bloatware

  • refers to unwanted software that comes preinstalled on a system or bundled with other software, occupying memory and processing resources and potentially leading to system slowdowns.

New cards
81
  • Virus

  • malware that reproduces itself, needing to be executed, typically exhibit more destructive behaviors, such as file corruption or data theft.

New cards
82
  • Logic bomb

  • a string of code embedded in a software system or computer program that remains dormant until triggered by a specific logical event.

New cards
83

Keylogger

A keylogger is a type of malware or hardware device that records every keystroke a user types on a keyboard, often used to steal login credentials, credit card numbers, or other sensitive information.

Example:

A hacker installs a software keylogger on a victim’s computer, capturing their bank login credentials and using them to access the account.

New cards
84
  • Rootkit

  • Definition: A type of stealthy malware that hides deep in a system to give attackers remote access while avoiding detection.

  • Example: A hacker installs a rootkit on a victim’s computer, allowing them to steal files and monitor activities without being noticed.

New cards
85
  • Radio frequency identification (RFID) cloning

  • Definition: Copying data from an RFID-based access card or key fob to create a duplicate for unauthorized entry.

  • Example: An attacker uses an RFID scanner near an employee’s badge to clone it and gain access to a restricted area.

New cards
86
  • Environmental

  • Definition: Physical threats caused by environmental factors like heat, fire, flooding, or power failures.

  • Example: A server room without proper cooling overheats, causing a system crash and data loss.

New cards
87

Amplified DDoS Attack

  • Definition: A DDoS attack where attackers use small requests to trigger massive responses from a network, overwhelming the target.

  • Example: A hacker sends small DNS queries that result in large responses, overwhelming a victim’s server.

New cards
88

Reflected DDoS Attack

  • Definition: A DDoS attack that tricks legitimate servers into sending large amounts of traffic to a victim’s IP address.

  • Example: A hacker spoofs a victim’s IP and sends multiple requests to unsecured servers, causing them to flood the victim’s network with replies.

New cards
89

Domain Name System (DNS) Attacks

  • Definition: Exploiting weaknesses in DNS to redirect users to malicious sites or disrupt services.

  • Example: An attacker poisons a DNS server, causing users who try to visit a bank's website to be redirected to a phishing site instead.

New cards
90

Wireless Attacks

  • Definition: Attacks targeting Wi-Fi networks to intercept or manipulate data.

  • Example: A hacker sets up a fake Wi-Fi hotspot at a coffee shop to steal user credentials.

New cards
91

On-Path Attacks (Man-in-the-Middle, MITM)

  • Definition: An attacker intercepts communication between two parties to steal or alter data.

  • Example: A hacker eavesdrops on a public Wi-Fi network, capturing login credentials sent over an unencrypted connection.

New cards
92

Credential Replay Attack

  • Definition: An attacker intercepts and reuses login credentials to gain unauthorized access.

  • Example: A hacker steals a session token from a user’s browser and reuses it to log into their bank account.

New cards
93
  • Malicious code

  • Definition: Any form of malware designed to harm, exploit, or disrupt systems.

  • Example: A phishing email tricks users into downloading a trojan virus that steals their passwords.

New cards
94
  • Injection

  • a application attack that involve sending untrusted data to an interpreter as part of a command or query. This data tricks the interpreter into executing unintended commands, potentially allowing unauthorized access or data retrieval.

New cards
95
  • Buffer overflow

  • occurs when a program writes more data into a memory buffer than it can hold, causing the excess data to overwrite adjacent memory. Attackers exploit this vulnerability to execute malicious code or crash a system

  • Example:

    A hacker inputs a long string of characters into a website's login form, exceeding the expected limit and overwriting memory to gain unauthorized system access.

New cards
96
  • Replay

  • a application attack that involve the malicious repetition or delayed transmission of valid data.

New cards
97
  • Privilege escalation

  • Definition: When an attacker gains higher access rights than they are supposed to have.

  • Example: A hacker exploits a system vulnerability to elevate their account from a regular user to an administrator.

New cards
98

Forgery (Session or Identity Forgery)

  • Definition: Creating fake data, credentials, or requests to impersonate a legitimate user or system.

  • Example: An attacker spoofs an employee’s email to request a fraudulent wire transfer.

New cards
99

Directory Traversal

  • Definition: A web attack where an attacker accesses restricted files by navigating outside the intended directory.

  • Example: A hacker inputs “../../etc/passwd” into a website URL to access system files.

New cards
100
  • Downgrade

  • cryptographic attack, involves forcing a system to abandon its high-security mode and revert to a less secure state.

New cards
robot