Physical Attacks - SY0-601 CompTIA Security+ : 1.2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

What is a malicous USB cable

A USB cable that has been modified or designed to carry out harmful activities when connected to a device. These cables can be used to exploit vulnerabilities in a computer or mobile device, allowing unauthorized access, data theft, or installation of malware. It is important to be cautious when using USB cables from unknown or untrusted sources to mitigate the risk of potential attacks.

2
New cards

What is a malicous flash drive

A storage device that is intentionally designed to carry out harmful activities on a computer or network. It may contain malware, viruses, or other malicious software that can compromise the security and integrity of the system it is connected to. These flash drives are often used for unauthorized data access, data theft, or spreading malware to other devices.

3
New cards

What can a malicious flash drive or USB cable do to your computer?

These devices can potentially perform various harmful actions on a computer, such as:

  1. Install malware: It can automatically execute malicious code or install malware onto the computer, compromising its security.

  2. Steal data: It can copy sensitive information from the computer, including personal files, login credentials, or financial data.

  3. Damage files or system: It can corrupt or delete files, modify system settings, or even render the computer inoperable.

  4. Spread infections: It can transfer malware to other connected devices or networks, facilitating the spread of infections.

  5. Exploit vulnerabilities: It can take advantage of software vulnerabilities to gain unauthorized access or control over the computer.

4
New cards

What is skimming

the action of stealing credit card information or payment card data from customers of an online store. The transaction data is intercepted during the online purchase checkout process, without customers noticing anything unusual.

5
New cards

What is card cloning

The unauthorized copying of information from a credit or debit card onto another card. This is typically done by criminals who use specialized devices to extract card data, such as the card number and PIN. The cloned card can then be used to make fraudulent transactions, potentially leading to financial loss for the cardholder. It is important to safeguard personal card information and report any suspicious activity to the card issuer.