Send a link to your students to track their progress
845 Terms
1
New cards
Phishing
fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.
2
New cards
Smishing
When someone tries to trick you into giving them your private information via a text or SMS message.
3
New cards
Vishing
Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward
4
New cards
Spam
irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware
5
New cards
SPIM
Spam delivered through instant messaging (IM) instead of through e-mail messaging
6
New cards
Spear Phishing
the act of sending emails to specific and well-researched targets while pretending to be a trusted sender
7
New cards
Dumpster Diving
exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.
8
New cards
Shoulder Surfing
When someone watches over your shoulder to nab valuable information as you key it into an electronic device.
9
New cards
Pharming
cyberattack intended to redirect a website's traffic to another, fake site.
10
New cards
Tailgating
Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.
11
New cards
Eliciting Information
Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform
12
New cards
Whaling
Spear phishing that focuses on one specific high level executive or influencer
13
New cards
Prepending
Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.
14
New cards
Identity Fraud
identity fraud is the use of stolen information such as making fake ID's and fake bank accounts
15
New cards
Invoice Scams
using fraudulent invoices to steal from a company
16
New cards
Credential Harvesting
the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.
17
New cards
Reconnaissance
- Information gathering about a target network
18
New cards
Hoax
Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.
19
New cards
Impersonation
typically involves an email that seems to come from a trusted source.
20
New cards
Watering hole attack
security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.
21
New cards
Typo squatting
type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system
22
New cards
Pretexting
the practice of presenting oneself as someone else in order to obtain private information.
23
New cards
Influence campaigns
24
New cards
Hybrid warfare
- Combining conventional warfare with cyberwarfare
25
New cards
Social Media Campaign
Planned, coordinated marketing efforts using one or more social media platforms.
26
New cards
Principles:
Authority: an attacker may try to appear to have a certain level authority.
27
New cards
Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes.
28
New cards
Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same.
29
New cards
Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline.
30
New cards
Familiarity: they make you familiar with them on the phone and make you want to do things for them.
31
New cards
Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted.
32
New cards
Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.
33
New cards
Malware
a program or file designed to be disruptive, invasive and harmful to your computer.
34
New cards
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
35
New cards
Worms
Independent computer programs that copy themselves from one computer to other computers over a network
36
New cards
potentially unwanted program (PUP)
program that installs itself on a computer, typically without the user's informed consent
37
New cards
Fileless virus
Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.
38
New cards
command and control
A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network
39
New cards
Bots
self-propagating malware that infects its host and connects back to a central server(s).
40
New cards
Cryptomalware
Malware to remain in place for as long as possible, quietly mining in the background.
41
New cards
logic bomb
A computer program or part of a program that lies dormant until it is triggered by a specific logical event.
42
New cards
Spyware
Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.
43
New cards
Keyloggers
software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.
44
New cards
Remote Access Trojan
type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.
45
New cards
Rootkit
software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine
46
New cards
Backdoor
refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
47
New cards
Password Attack
Any type of attack in which the attacker
48
New cards
attempts to obtain and make use of passwords illegitimately.
49
New cards
Spraying password attack
50
New cards
Dictionary password attack
An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.
51
New cards
brute force password attack (offline and online)
an attempt to guess a password by attempting every possible combination of characters and numbers in it
52
New cards
Rainbow Tables
an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password
53
New cards
Plaintext/unencrypted password attack
54
New cards
Malicious universal serial bus (USB) cable
55
New cards
Malicious flash drive
56
New cards
Card cloning
57
New cards
Skimming
58
New cards
Adversarial artificial intelligence (AI)
1. Tainted training for machine learning (ML)
59
New cards
2. Security of machine learning algorithms
60
New cards
Supply-chain attacks
61
New cards
Cloud-based vs. on-premises attacks
62
New cards
Cryptographic attacks
1. Birthday:
63
New cards
2. Collision:
64
New cards
3. Downgrade:
65
New cards
Privilege escalation
66
New cards
Cross-site scripting
67
New cards
Injections
68
New cards
Structured query language (SQL)
69
New cards
Dynamic link library
70
New cards
Lightweight directory access protocol (LDAP)
71
New cards
Extensible markup language (XML)
72
New cards
Pointer/object dereference
73
New cards
Directory traversal
74
New cards
Buffer overflows
75
New cards
Race conditions(Time of check/time of use)
76
New cards
Error handling
77
New cards
Improper input handling
78
New cards
Replay attack (session replays)
79
New cards
Integer overflow
80
New cards
Request forgeries
1. Server-side
81
New cards
2. Cross-site
82
New cards
Application programming interface (API) attacks
83
New cards
Resource exhaustion
84
New cards
Memory leak
85
New cards
Secure sockets layer (SSL) stripping
86
New cards
Driver manipulation
87
New cards
Shimming
88
New cards
Refactoring
89
New cards
Pass the hash
90
New cards
Wireless Evil Twin
91
New cards
Rogue access point
92
New cards
Bluesnarfing
93
New cards
Bluejacking
Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers.
94
New cards
Disassociation
95
New cards
Jamming
96
New cards
Radio frequency identifier (RFID)
97
New cards
Near Field Communication (NFC)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
98
New cards
Initialization Vector (IV)
A 24-bit value used in WEP that changes each time a packet is encrypted.