Cybersecurity Lecture Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

flashcard set

Earn XP

Description and Tags

Flashcards covering cybersecurity concepts and threats.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Tailgating

Exploits politeness to gain access to restricted systems or data.

2
New cards

Identity Theft

Stealing personal data to impersonate someone for fraud, system access, or theft.

3
New cards

Phishing

Tricking individuals into giving login info or personal data via fake emails.

4
New cards

Data Breach

Breaking into large company databases to steal user information.

5
New cards

Keyloggers

Secretly recording everything typed, like passwords.

6
New cards

Dumpster Diving

Searching trash for sensitive documents.

7
New cards

Public Wi-Fi Attacks

Intercepting traffic on unsecured Wi-Fi to steal data.

8
New cards

Cyberstalking

Using digital platforms to harass, intimidate, or monitor victims.

9
New cards

Zero Trust

A security model assuming no user/device is trustworthy by default, requiring continuous verification.

10
New cards

Exploit

Code that exploits a vulnerability to cause harm or gain unauthorized access.

11
New cards

Patch

Software update to fix vulnerabilities or improve functionality.

12
New cards

Threat Actor

Individual or group responsible for a cyberattack or threat.

13
New cards

Social Engineering

Manipulates the human mind to bypass technical security, exploiting emotions.

14
New cards

Attack Surface

All the points at which a malicious actor could try to exploit a vulnerability

15
New cards

Attack Vector

The specific path or method that a threat actor uses to exploit a vulnerability.

16
New cards

Spoofing

Falsifying the source of a communication to appear from a trusted entity.

17
New cards

Vishing (Voice Phishing)

Attackers calling pretending to be tech support, your bank, or even the police, in order to trick/scam you.

18
New cards

Pretexting

Creating a fabricated situation/story to gain trust and extract information from victims.

19
New cards

Baiting

Luring victims with tempting items like usb drives, and leading them to compromise their security.

20
New cards

Quid Pro Quo

Offering a fake deal where the attacker gives something in return for information.

21
New cards

Risk

The likelihood and potential impact of a threat exploiting a vulnerability to harm an asset.

22
New cards

Control

A measure or mechanism designed to prevent, detect, or respond to threats and reduce risks.

23
New cards

Attack

An intentional act to exploit a vulnerability and compromise an information asset.

24
New cards

Breach

Unauthorized access to sensitive data, compromising confidentiality, integrity, or availability.

25
New cards

Incident

Any event that disrupts normal operations or compromises security.

26
New cards

Encryption

Converting data into a coded format to prevent unauthorized access.

27
New cards

Penetration Testing

Legal simulation of a cyberattack to test a system's defenses.

28
New cards

Social Engineering

Manipulating individuals to divulge sensitive information or perform actions that compromise security.

29
New cards

Vulnerability Assessments

Finding and reporting weaknesses in systems.

30
New cards

Black Hat Hackers

Criminal hackers who hack without permission.

31
New cards

Gray Hat Hackers

Hackers who don't ask permission but don't have bad intentions.

32
New cards

Script Kiddies

Unskilled hackers using pre-made tools.

33
New cards

Green Hat Hackers

New hackers eager to learn.

34
New cards

Red Hat Hackers

Cyber vigilantes who hunt and take down black hats.

35
New cards

Nation-State Hackers

Highly skilled hackers working for the government.

36
New cards

Hacktivists

Hackers using hacking techniques to promote political, social, or ideological causes.

37
New cards

Polymorphic Phishing

Using AI to generate unique emails to evade filters.

38
New cards

Spear Phishing

Targeted phishing attack with a fake message crafted specifically for the victim.

39
New cards

Watering Hole Attack

Compromising websites that a specific group of users are likely to visit.

40
New cards

Angler Phishing

Impersonating customer service representatives on social media.

41
New cards

Whaling

A type of spear phishing aimed at high-profile people like company executives.

42
New cards

Authorization

Determines what an authenticated user is allowed to do.

43
New cards

Least Privilege Principle

Users/devices get only the permissions necessary for their tasks.

44
New cards

Separation of Duties

Prevents single users from having conflicting permissions.

45
New cards

Accounting

Keeping logs of what the authenticated users did.

46
New cards

RADIUS

A network protocol that helps manage authentication, authorization, and accounting

47
New cards

White Hat Hackers

the ethical hackers. they hack legally to help organizations and governments to find and fix vulnerabilities before criminals exploit it.

48
New cards

Information Asset

Any data, device, or resource that has value to an organization and requires protection.

49
New cards

Threat

Any potential danger that could exploit a vulnerability to harm an information asset.

50
New cards

Vulnerability

A weakness or flaw in a system, process, or control that can be exploited by a threat.

51
New cards

Authentication

The process of identifying a user, or a process to verify the identity of a user/device.