CSEC 280 Module 01

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Threat

The potential occurrence of an undesirable event that can eventually damage and disrupt the operational and functional activities of an organization

2
New cards

Threat Vector

Is a medium through which an attacker gains access to a system by exploiting identified vulnerabilities

3
New cards

Malware

Is a malicious software that damages or disables computer systems and give limited or full control of the system to the malware creator for the purpose of theft or fraud

4
New cards

Trojan

A program where malicious or harmful code is contained within an apparently harmless program or data, which later can cause damage

5
New cards

Virus

A self-replicating program that produces its own copy by attaching itself to another program, computer boot sector, or document

6
New cards

Ransomware

Restricts access to the computers system's file and folders. Attacker will demand an online ransom payment

7
New cards

Computer Worm

Independently replicate, execute, and spread across a network

8
New cards

Rootkit

Program that hides in a computer and allows someone from a remote location to take full control of the computer

9
New cards

Potentially Unwanted Application (PUAs)

Harmful applications that may pose severe risks to the security and privacy of data stored in the system where they are installed

10
New cards

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

11
New cards

Spyware

A stealthy program that records the user's interaction with the computer and the Internet without the user's knowledge and sends the information to remote attackers

12
New cards

Keylogger

A small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard.

13
New cards

Botnet

A collection of compromised computers under the control of a master node

14
New cards

Fileless Malware

A type of malicious software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

15
New cards

Divergent

A type of fileless malware that depends mostly on the registry for the execution and storage configuration data

16
New cards

Vulnerability

Refers to the existence of weakness in an asset that can be exploited by threat agents

17
New cards

Risk

Refers to the potential loss or damage that can occur when a threat to an asset exists in the presence of a vulnerability that can be exploited

18
New cards

Misconfigurations

Most common vulnerability and is mainly caused by human error

19
New cards

Default Installations

Failing to change the default while deploying the software or hardware allows the attacker to guess the settings to break into the system

20
New cards

Application Flaws

Vulnerabilities in applications that are exploited by the attackers

21
New cards

Poor Patch Mangement

When a system properly doesn't install patches

22
New cards

Patch

A small piece of software designed to fix problems

23
New cards

Design Flaws

Logical flaws in the functionality of the system that attackers exploit to bypass the detection mechanism and acquire access to a secure system

24
New cards

Operation System Flaws

Vulnerabilities in the operating system

25
New cards

Zero-Day Vulnerabilities

Exploited by attackers before being acknowledged and patched by the software developers or security analyests

26
New cards

Legal Platform Vulnerabilities

Caused by obsolete or familiar code. Not supported when patching technical assets

27
New cards

System Sprawl

Arises in an organizational network because of an increased number of system or server connections without proper documentation or an understanding of their maintenance

28
New cards

Improper Certificate & Key Management

Allows the attackers to perform password cracking and data exfiltration attacks

29
New cards

Third Party Risks

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.