CYBERSECURITY

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

2
New cards

Cyberattacks

Offensive actions that target computer information systems, networks, or personal devices to steal, alter, or destroy data.

3
New cards

Denial-of-Service (DoS) Attack

Overwhelms a system's resources, making it unable to respond to service requests.

4
New cards

Distributed Denial-of-Service (DDoS) Attack

Similar to a DoS attack, but launched from multiple infected host machines controlled by the attacker.

5
New cards

Man-in-the-Middle (MitM) Attack

Occurs when a hacker intercepts and manipulates communications between a client and a server.

6
New cards

Drive-by Attack

Spreading malware by injecting a malicious script into insecure websites or redirecting victims to controlled sites.

7
New cards

Password Attack

Obtaining passwords through various methods like social engineering, guessing, or brute-force password guessing.

8
New cards

Birthday Attack

Exploiting hash algorithms to find two random messages that generate the same message digest.

9
New cards

Cybersecurity Events:

10
New cards

undefined

"Creeper" infected ARPANET, leading to the creation of the first antivirus program.

11
New cards

undefined

Greg Chung stole aerospace documents for 30 years and gave them to China.

12
New cards

undefined

Edward Snowden leaked classified information from the National Security Agency.

13
New cards

undefined

Hackers compromised Yahoo, exposing personal information of over 3 billion users.

14
New cards

undefined

WannaCry ransomware infected over 230,000 computers in one day.

15
New cards

undefined

NotPetya virus wiped data from computers, including energy firms and government offices.

16
New cards

undefined

Equifax failed to patch a vulnerability, compromising data of over 143 million Americans.

17
New cards

Cyber Kill Chain

A series of steps followed by attackers to infiltrate and exploit a target system.

18
New cards

Security Operations Center (SOC)

A team of IT security professionals that monitors an organization's IT infrastructure to detect cybersecurity events.

19
New cards

Security Posture

The readiness of an organization to protect its assets from cyber threats.

20
New cards

SOC Activities and Responsibilities

Preparation, planning, and prevention; monitoring, detection, and response; recovery, refinement, and compliance.

21
New cards

SOC Team Members

Incident Responder, Forensic Investigator, Compliance Auditor, Security Analyst, Security Engineer, Threat Hunter, SOC Manager, SOC Operator, Malware Analyst, Security Awareness Trainer.