Domain 2 Flash Cards

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Nation state

1 / 108

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

109 Terms

1

Nation state

Government-sponsored entities that engage in cyber operations to further national security interests, often through sophisticated tactics.

New cards
2

Advanced Persistent Threat (APT)

Nation-backed agents or organized cybercriminal groups recognized for their capability to infiltrate specific systems and remain hidden, gradually stealing data over extended periods.

New cards
3

Unskilled attacker

Individuals who typically lack advanced technical skills and use basic tools sourced from the dark web; their motivations can range from personal gain to seeking notoriety.

New cards
4

Hacktivist

Attacks driven by ideological, political, or social motives aimed at promoting a cause, raising awareness, or enacting change, often through defacement of websites or leaking sensitive information as a form of digital protest.

New cards
5

Client-based scanning

A tool used for automating vulnerability discovery, classification, and reporting to a central management server.

New cards
6

Agentless scanning

A preferred method for threat actors that allows scanning of hosts without necessitating installations.

New cards
7

Legacy and third party software

Common targets for threats due to potential vulnerabilities.

New cards
8

Service Set Identifier (SSID)

Acts as the network name; disabling its broadcast obscures the network presence from casual attackers.

New cards
9

MAC filtering

A security measure that permits only approved MAC addresses to access the wireless network.

New cards
10

Supply Chain

The process of transforming raw materials into finished products for consumer availability.

New cards
11

Managed Service Providers (MSP)

Third-party organizations that handle all of a company's IT needs.

New cards
12

Vendors

Entities that provide goods and services to companies or consumers, often sharing sensitive information.

New cards
13

Suppliers

Third-party contributors who supply goods or services to an organization.

New cards
14

Human Vectors/Social Engineering

Methods used by attackers to manipulate individuals into divulging confidential information.

New cards
15

Pretexting

A social engineering tactic involving the creation of a fabricated scenario to extract information, such as impersonating a tech support agent.

New cards
16

Watering hole attacks

Attacks that compromise legitimate websites to implement malicious code.

New cards
17

Typo squatting

A malicious practice that exploits common typing errors to redirect users to fraudulent sites.

New cards
18

Memory Injection

The secret insertion of malicious code into a program's memory space, often remaining undetected by exploiting the dynamic nature of memory collection.

New cards
19

Buffer Overflow

Attackers flood a program's buffer with excess data, which can overwrite adjacent memory spaces and open doors for unauthorized access.

New cards
20

Race Conditions

Occurs when two instructions from separate threads try to access the same data simultaneously; TOC/TOU deals with synchronization of shared resources.

New cards
21

SQL Injection (SQLI)

Attackers exploit vulnerabilities in a website or application’s input fields to manipulate SQL queries executed on the backend database.

New cards
22

Stored Procedures

Database objects that encapsulate a sequence of SQL statements, providing a layer of security against SQL injection.

New cards
23

VM Escape

An unexpected challenge introduced by hypervisors, potentially creating a path for lateral movement and unauthorized access.

New cards
24

Resource Reuse

Improper allocation and management of resources can lead to performance issues; resource exhaustion is a major concern.

New cards
25

VM Sprawl

Uncontrolled and excessive creation of virtual machines, which can lead to unmanaged growth in the computing environment.

New cards
26

Risk of Shared Tenancy

Multiple customers sharing the same cloud infrastructure, which can expose sensitive data if not properly managed.

New cards
27

Inadequate Configuration Management

Lack of understanding or mishandling of configurations may expose resources or leave open ports vulnerable.

New cards
28

Identity and Access Management Flaws

Issues caused by misconfigured user permissions, compromised credentials, or weak authentication processes.

New cards
29

Cloud Access Security Broker (CASB)

Enforces company security policies by bridging the gap between on-premises and dynamic cloud environments.

New cards
30

Service Provider Vulnerabilities

Poorly managed third-party relationships can result in lapses in security controls and expose organizations to risks.

New cards
31

Hardware Provided Vulnerabilities

Counterfeit or compromised hardware components that can infiltrate the supply chain and pose security risks.

New cards
32

Key Compromise

Keys can be compromised due to theft, weak generation methods, or poor key management practices.

New cards
33

Side Channel Attacks

Attacks that exploit cryptographic operations leaking information through channels like power consumption, timing, or radiation.

New cards
34

Backdoor Exploitation

Access through backdoors can render encryption useless, allowing attackers to compromise cryptographic systems.

New cards
35

Certificate Revocation List (CRL)

A list that indicates which certificates are valid or revoked; essential for maintaining certificate integrity.

New cards
36

Online Certificate Status Protocol (OCSP)

A protocol enabling real-time certificate validation, regarded as superior to traditional CRLs.

New cards
37

SSL Stripping

An SSL downgrade attack that bypasses certificate-based protection, converting secure HTTPS connections to unprotected HTTP.

New cards
38

SSL/TLS Downgrade

Interception of SSL traffic by a server impersonating an older browser, enabling weaker encryption and easier data access.

New cards
39

Network Device Vulnerabilities

Open ports, weak access controls, and unpatched firmware that can facilitate DDoS and man-in-the-middle attacks.

New cards
40

Access Control Lists (ACLs)

Rules that may inadvertently grant unauthorized access to sensitive segments of the network.

New cards
41

Firewalls

Devices that act as a frontline defense against unauthorized access by filtering incoming and outgoing network traffic.

New cards
42

Jailbreaking

The process allowing Apple device users to bypass manufacturer or OS restrictions for enhanced control.

New cards
43

Rooting

Enables Android device users to bypass manufacturer or OS restrictions for greater control over their device.

New cards
44

Sideloading

The practice of using APK files to install applications on Android devices outside of authorized app stores.

New cards
45

Zero Day Vulnerabilities

Hidden flaws in software that hackers can exploit before the developers are aware, providing unrestricted access to systems.

New cards
46

Potentially Unwanted Programs (PUPs)

Programs downloaded alongside other software that overconsume computer resources, leading to performance degradation.

New cards
47

Ransomware

A type of malware that encrypts private files and demands a ransom payment for their release.

New cards
48

Prevention against Ransomware Attacks

Using endpoint protection software such as EDR or XDR tools provides enhanced security against ransomware.

New cards
49

Trojans

Malicious software that deceives users by appearing as legitimate software, potentially creating backdoor access.

New cards
50

Portable Executable Files

Common executable and binary file formats used in Windows operating systems.

New cards
51

Remote Access Trojans (RATs)

Malware that allows attackers to control compromised systems remotely.

New cards
52

Worms

Self-replicating malware that spreads through networks, consuming bandwidth and memory.

New cards
53

Spyware

Malicious software that monitors user activities, consuming system resources.

New cards
54

Bloatware

Pre-installed software on new devices that can drain performance and storage resources.

New cards
55

Polymorphic Viruses

Malware that alters its code to evade detection by traditional security measures.

New cards
56

Keyloggers

Stealthy software that records users' keystrokes to capture sensitive information.

New cards
57

Logic Bombs

Malicious code that remains dormant until triggered by a specific condition.

New cards
58

Rootkits

Malware that hides within the operating system to evade detection while providing remote control capabilities.

New cards
59

Malware Inspection

The process of analyzing suspicious software in a sandbox environment to assess its safety.

New cards
60

Radio Frequency Identification (RFID) Cloning

The unauthorized copying of signals from RFID key cards to gain access to secure areas.

New cards
61

Pivoting

When an attacker moves laterally within a network by exploiting a vulnerable host.

New cards
62

Network Mapper (Nmap) Tool

A tool used to discover hosts and services on a computer network.

New cards
63

Distributed Denial of Service (DDoS)

An attack that overwhelms a target's servers to render them inoperable by flooding them with traffic.

New cards
64

Botnet

A collection of internet-connected devices that are infected and controlled as a group for malicious activities.

New cards
65

Amplified Attack

A type of attack where a small request results in a significantly larger response, exploiting network protocols.

New cards
66

Reflected Attack

An attack where the attacker spoofs the victim's IP address to make it appear as if the victim is sending the request.

New cards
67

Domain Name System (DNS)

The system that translates human-readable domain names to IP addresses.

New cards
68

ARP Poisoning

An attack that sends forged ARP messages to a local area network to map IP addresses to the attacker's MAC address.

New cards
69

DNS Sinkhole

A security measure that redirects traffic intended for malicious domains to controlled servers.

New cards
70

DNS Cache Poisoning

A manipulation technique that alters DNS records to redirect users to malicious sites.

New cards
71

Rogue Access Points

Unauthorized wireless access points that mimic legitimate ones to steal user information.

New cards
72

Evil Twin Attack

A malicious access point that intercepts communications between users and the legitimate network.

New cards
73

Deauthentication and Jamming Attacks

Attacks that disrupt user connections to a wireless access point, forcing disconnections.

New cards
74

MAC Spoofing

The technique of changing a device's MAC address to impersonate an authorized device.

New cards
75

WiFi Analyzers

Tools used to detect and analyze wireless network traffic for security breaches.

New cards
76

On-Path Attack

Interception attacks that allow eavesdropping on data exchanges.

New cards
77

Replay Attack

An on-path attack that captures and retransmits data at a later time.

New cards
78

Credential Replay Attacks

Attacks that capture and reuse valid login credentials for unauthorized access.

New cards
79

NT LAN Manager (NTLM) Disadvantages

Being a legacy system, NTLM is particularly susceptible to various attacks.

New cards
80

Credential Stuffing

An attack that involves using stolen usernames and passwords to access multiple accounts.

New cards
81

Bash Shell Attacks

Exploits that execute unauthorized commands on a system through the bash shell.

New cards
82

Injection Attacks

Attacks that insert untrusted data into a program via inputs, leading to various exploitations.

New cards
83

Buffer Overflow

A vulnerability where excessive data overwrites memory, potentially leading to unauthorized code execution.

New cards
84

Privilege Escalation

Gaining elevated access rights to perform unauthorized actions on a system.

New cards
85

Forgery Attacks

Attacks that manipulate data to impersonate legitimate users or systems.

New cards
86

Server-Side Request Forgery (SSRF)

A vulnerability that permits attackers to send unauthorized requests from a server.

New cards
87

Directory Traversal

An attack that seeks to access restricted files by manipulating directory paths.

New cards
88

Cryptographic Attacks

Attacks that exploit weaknesses in cryptographic algorithms or protocols.

New cards
89

Downgrade Attack

An attack that attempts to weaken encryption between two communicating parties.

New cards
90

SSL/TLS Downgrade Attack

Exploits vulnerabilities to enforce insecure encryption methods during communication.

New cards
91

SSL Stripping

An attack that converts secure HTTPS connections to unprotected HTTP, allowing eavesdropping.

New cards
92

Birthday attack

An attack that exploits the probability of two inputs producing the same hash value due to collisions.

New cards
93

Pass the Hash Attack

An attack that uses the hash of a password to impersonate a user without needing to know the password.

New cards
94

Dictionary Attack

An attack using a list of words to guess passwords, without including variations like misspellings.

New cards
95

Password Spraying

An attack that uses common passwords against many accounts to find a successful login.

New cards
96

Brute Force Attack

A trial-and-error method used to decode encrypted data such as passwords.

New cards
97

Hybrid Attacks

Attacks that combine elements of both dictionary and brute force techniques.

New cards
98

Online Password Attack

An attempt to break a password using the website's login interface.

New cards
99

Offline Password Attack

Cracking passwords from storage without alerting security systems.

New cards
100

Indicators of Attack

Early warnings of potential threats through detection of suspicious activities on a network.

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
4.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(3)
note Note
studied byStudied by 18 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (80)
studied byStudied by 13 people
... ago
4.0(1)
flashcards Flashcard (73)
studied byStudied by 15 people
... ago
4.5(2)
flashcards Flashcard (65)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 242 people
... ago
5.0(5)
flashcards Flashcard (79)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 228 people
... ago
5.0(4)
robot