Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 108
There's no tags or description
Looks like no one added any tags here yet for you.
109 Terms
1
Nation state
Government-sponsored entities that engage in cyber operations to further national security interests, often through sophisticated tactics.
New cards
2
Advanced Persistent Threat (APT)
Nation-backed agents or organized cybercriminal groups recognized for their capability to infiltrate specific systems and remain hidden, gradually stealing data over extended periods.
New cards
3
Unskilled attacker
Individuals who typically lack advanced technical skills and use basic tools sourced from the dark web; their motivations can range from personal gain to seeking notoriety.
New cards
4
Hacktivist
Attacks driven by ideological, political, or social motives aimed at promoting a cause, raising awareness, or enacting change, often through defacement of websites or leaking sensitive information as a form of digital protest.
New cards
5
Client-based scanning
A tool used for automating vulnerability discovery, classification, and reporting to a central management server.
New cards
6
Agentless scanning
A preferred method for threat actors that allows scanning of hosts without necessitating installations.
New cards
7
Legacy and third party software
Common targets for threats due to potential vulnerabilities.
New cards
8
Service Set Identifier (SSID)
Acts as the network name; disabling its broadcast obscures the network presence from casual attackers.
New cards
9
MAC filtering
A security measure that permits only approved MAC addresses to access the wireless network.
New cards
10
Supply Chain
The process of transforming raw materials into finished products for consumer availability.
New cards
11
Managed Service Providers (MSP)
Third-party organizations that handle all of a company's IT needs.
New cards
12
Vendors
Entities that provide goods and services to companies or consumers, often sharing sensitive information.
New cards
13
Suppliers
Third-party contributors who supply goods or services to an organization.
New cards
14
Human Vectors/Social Engineering
Methods used by attackers to manipulate individuals into divulging confidential information.
New cards
15
Pretexting
A social engineering tactic involving the creation of a fabricated scenario to extract information, such as impersonating a tech support agent.
New cards
16
Watering hole attacks
Attacks that compromise legitimate websites to implement malicious code.
New cards
17
Typo squatting
A malicious practice that exploits common typing errors to redirect users to fraudulent sites.
New cards
18
Memory Injection
The secret insertion of malicious code into a program's memory space, often remaining undetected by exploiting the dynamic nature of memory collection.
New cards
19
Buffer Overflow
Attackers flood a program's buffer with excess data, which can overwrite adjacent memory spaces and open doors for unauthorized access.
New cards
20
Race Conditions
Occurs when two instructions from separate threads try to access the same data simultaneously; TOC/TOU deals with synchronization of shared resources.
New cards
21
SQL Injection (SQLI)
Attackers exploit vulnerabilities in a website or application’s input fields to manipulate SQL queries executed on the backend database.
New cards
22
Stored Procedures
Database objects that encapsulate a sequence of SQL statements, providing a layer of security against SQL injection.
New cards
23
VM Escape
An unexpected challenge introduced by hypervisors, potentially creating a path for lateral movement and unauthorized access.
New cards
24
Resource Reuse
Improper allocation and management of resources can lead to performance issues; resource exhaustion is a major concern.
New cards
25
VM Sprawl
Uncontrolled and excessive creation of virtual machines, which can lead to unmanaged growth in the computing environment.
New cards
26
Risk of Shared Tenancy
Multiple customers sharing the same cloud infrastructure, which can expose sensitive data if not properly managed.
New cards
27
Inadequate Configuration Management
Lack of understanding or mishandling of configurations may expose resources or leave open ports vulnerable.
New cards
28
Identity and Access Management Flaws
Issues caused by misconfigured user permissions, compromised credentials, or weak authentication processes.
New cards
29
Cloud Access Security Broker (CASB)
Enforces company security policies by bridging the gap between on-premises and dynamic cloud environments.
New cards
30
Service Provider Vulnerabilities
Poorly managed third-party relationships can result in lapses in security controls and expose organizations to risks.
New cards
31
Hardware Provided Vulnerabilities
Counterfeit or compromised hardware components that can infiltrate the supply chain and pose security risks.
New cards
32
Key Compromise
Keys can be compromised due to theft, weak generation methods, or poor key management practices.
New cards
33
Side Channel Attacks
Attacks that exploit cryptographic operations leaking information through channels like power consumption, timing, or radiation.
New cards
34
Backdoor Exploitation
Access through backdoors can render encryption useless, allowing attackers to compromise cryptographic systems.
New cards
35
Certificate Revocation List (CRL)
A list that indicates which certificates are valid or revoked; essential for maintaining certificate integrity.
New cards
36
Online Certificate Status Protocol (OCSP)
A protocol enabling real-time certificate validation, regarded as superior to traditional CRLs.
New cards
37
SSL Stripping
An SSL downgrade attack that bypasses certificate-based protection, converting secure HTTPS connections to unprotected HTTP.
New cards
38
SSL/TLS Downgrade
Interception of SSL traffic by a server impersonating an older browser, enabling weaker encryption and easier data access.
New cards
39
Network Device Vulnerabilities
Open ports, weak access controls, and unpatched firmware that can facilitate DDoS and man-in-the-middle attacks.
New cards
40
Access Control Lists (ACLs)
Rules that may inadvertently grant unauthorized access to sensitive segments of the network.
New cards
41
Firewalls
Devices that act as a frontline defense against unauthorized access by filtering incoming and outgoing network traffic.
New cards
42
Jailbreaking
The process allowing Apple device users to bypass manufacturer or OS restrictions for enhanced control.
New cards
43
Rooting
Enables Android device users to bypass manufacturer or OS restrictions for greater control over their device.
New cards
44
Sideloading
The practice of using APK files to install applications on Android devices outside of authorized app stores.
New cards
45
Zero Day Vulnerabilities
Hidden flaws in software that hackers can exploit before the developers are aware, providing unrestricted access to systems.
New cards
46
Potentially Unwanted Programs (PUPs)
Programs downloaded alongside other software that overconsume computer resources, leading to performance degradation.
New cards
47
Ransomware
A type of malware that encrypts private files and demands a ransom payment for their release.
New cards
48
Prevention against Ransomware Attacks
Using endpoint protection software such as EDR or XDR tools provides enhanced security against ransomware.
New cards
49
Trojans
Malicious software that deceives users by appearing as legitimate software, potentially creating backdoor access.
New cards
50
Portable Executable Files
Common executable and binary file formats used in Windows operating systems.
New cards
51
Remote Access Trojans (RATs)
Malware that allows attackers to control compromised systems remotely.
New cards
52
Worms
Self-replicating malware that spreads through networks, consuming bandwidth and memory.
New cards
53
Spyware
Malicious software that monitors user activities, consuming system resources.
New cards
54
Bloatware
Pre-installed software on new devices that can drain performance and storage resources.
New cards
55
Polymorphic Viruses
Malware that alters its code to evade detection by traditional security measures.
New cards
56
Keyloggers
Stealthy software that records users' keystrokes to capture sensitive information.
New cards
57
Logic Bombs
Malicious code that remains dormant until triggered by a specific condition.
New cards
58
Rootkits
Malware that hides within the operating system to evade detection while providing remote control capabilities.
New cards
59
Malware Inspection
The process of analyzing suspicious software in a sandbox environment to assess its safety.
New cards
60
Radio Frequency Identification (RFID) Cloning
The unauthorized copying of signals from RFID key cards to gain access to secure areas.
New cards
61
Pivoting
When an attacker moves laterally within a network by exploiting a vulnerable host.
New cards
62
Network Mapper (Nmap) Tool
A tool used to discover hosts and services on a computer network.
New cards
63
Distributed Denial of Service (DDoS)
An attack that overwhelms a target's servers to render them inoperable by flooding them with traffic.
New cards
64
Botnet
A collection of internet-connected devices that are infected and controlled as a group for malicious activities.
New cards
65
Amplified Attack
A type of attack where a small request results in a significantly larger response, exploiting network protocols.
New cards
66
Reflected Attack
An attack where the attacker spoofs the victim's IP address to make it appear as if the victim is sending the request.
New cards
67
Domain Name System (DNS)
The system that translates human-readable domain names to IP addresses.
New cards
68
ARP Poisoning
An attack that sends forged ARP messages to a local area network to map IP addresses to the attacker's MAC address.
New cards
69
DNS Sinkhole
A security measure that redirects traffic intended for malicious domains to controlled servers.
New cards
70
DNS Cache Poisoning
A manipulation technique that alters DNS records to redirect users to malicious sites.
New cards
71
Rogue Access Points
Unauthorized wireless access points that mimic legitimate ones to steal user information.
New cards
72
Evil Twin Attack
A malicious access point that intercepts communications between users and the legitimate network.
New cards
73
Deauthentication and Jamming Attacks
Attacks that disrupt user connections to a wireless access point, forcing disconnections.
New cards
74
MAC Spoofing
The technique of changing a device's MAC address to impersonate an authorized device.
New cards
75
WiFi Analyzers
Tools used to detect and analyze wireless network traffic for security breaches.
New cards
76
On-Path Attack
Interception attacks that allow eavesdropping on data exchanges.
New cards
77
Replay Attack
An on-path attack that captures and retransmits data at a later time.
New cards
78
Credential Replay Attacks
Attacks that capture and reuse valid login credentials for unauthorized access.
New cards
79
NT LAN Manager (NTLM) Disadvantages
Being a legacy system, NTLM is particularly susceptible to various attacks.
New cards
80
Credential Stuffing
An attack that involves using stolen usernames and passwords to access multiple accounts.
New cards
81
Bash Shell Attacks
Exploits that execute unauthorized commands on a system through the bash shell.
New cards
82
Injection Attacks
Attacks that insert untrusted data into a program via inputs, leading to various exploitations.
New cards
83
Buffer Overflow
A vulnerability where excessive data overwrites memory, potentially leading to unauthorized code execution.
New cards
84
Privilege Escalation
Gaining elevated access rights to perform unauthorized actions on a system.
New cards
85
Forgery Attacks
Attacks that manipulate data to impersonate legitimate users or systems.
New cards
86
Server-Side Request Forgery (SSRF)
A vulnerability that permits attackers to send unauthorized requests from a server.
New cards
87
Directory Traversal
An attack that seeks to access restricted files by manipulating directory paths.
New cards
88
Cryptographic Attacks
Attacks that exploit weaknesses in cryptographic algorithms or protocols.
New cards
89
Downgrade Attack
An attack that attempts to weaken encryption between two communicating parties.
New cards
90
SSL/TLS Downgrade Attack
Exploits vulnerabilities to enforce insecure encryption methods during communication.
New cards
91
SSL Stripping
An attack that converts secure HTTPS connections to unprotected HTTP, allowing eavesdropping.
New cards
92
Birthday attack
An attack that exploits the probability of two inputs producing the same hash value due to collisions.
New cards
93
Pass the Hash Attack
An attack that uses the hash of a password to impersonate a user without needing to know the password.
New cards
94
Dictionary Attack
An attack using a list of words to guess passwords, without including variations like misspellings.
New cards
95
Password Spraying
An attack that uses common passwords against many accounts to find a successful login.
New cards
96
Brute Force Attack
A trial-and-error method used to decode encrypted data such as passwords.
New cards
97
Hybrid Attacks
Attacks that combine elements of both dictionary and brute force techniques.
New cards
98
Online Password Attack
An attempt to break a password using the website's login interface.
New cards
99
Offline Password Attack
Cracking passwords from storage without alerting security systems.
New cards
100
Indicators of Attack
Early warnings of potential threats through detection of suspicious activities on a network.