Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
Google cybersecurity module 2 part 2
Studied by 0 people
0.0
(0)
Add a rating
View linked note
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 12
There's no tags or description
Looks like no one added any tags here yet for you.
13 Terms
View all (13)
Star these 13
1
Password attack
An attempt to access password-secured devices, systems, networks, or data.
New cards
2
Social engineering attack
A manipulation technique that exploits human error to gain private information, access, or valuables.
New cards
3
Physical attack
A security incident affecting both digital and physical environments.
New cards
4
Adversarial artificial intelligence
A technique that manipulates AI and machine learning to conduct attacks more efficiently.
New cards
5
Supply-chain attack
Targets systems or applications to locate a vulnerability where malware can be deployed.
New cards
6
Cryptographic attack
Affects secure forms of communication between a sender and intended recipient.
New cards
7
Advanced persistent threats (APTs)
Expert threat actors who access networks without authorization, often targeting large organizations.
New cards
8
Insider threats
Authorized users who abuse their access to harm an organization.
New cards
9
Hacktivists
Threat actors driven by a political agenda using digital technology to achieve goals.
New cards
10
Authorized hackers
Also known as ethical hackers, they conduct risk evaluations within the law.
New cards
11
Semi-authorized hackers
Researchers who seek vulnerabilities without exploiting them.
New cards
12
Unauthorized hackers
Malicious actors who exploit vulnerabilities for financial gain.
New cards
13
Vigilante hackers
Hackers who aim to protect against unethical hackers.
New cards