1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Cyberattacks
Offensive actions that target computer information systems, networks, or personal devices to steal, alter, or destroy data.
Denial-of-Service (DoS) Attack
Overwhelms a system's resources, making it unable to respond to service requests.
Distributed Denial-of-Service (DDoS) Attack
Similar to a DoS attack, but launched from multiple infected host machines controlled by the attacker.
Man-in-the-Middle (MitM) Attack
Occurs when a hacker intercepts and manipulates communications between a client and a server.
Drive-by Attack
Spreading malware by injecting a malicious script into insecure websites or redirecting victims to controlled sites.
Password Attack
Obtaining passwords through various methods like social engineering, guessing, or brute-force password guessing.
Birthday Attack
Exploiting hash algorithms to find two random messages that generate the same message digest.
Cybersecurity Events:
undefined
"Creeper" infected ARPANET, leading to the creation of the first antivirus program.
undefined
Greg Chung stole aerospace documents for 30 years and gave them to China.
undefined
Edward Snowden leaked classified information from the National Security Agency.
undefined
Hackers compromised Yahoo, exposing personal information of over 3 billion users.
undefined
WannaCry ransomware infected over 230,000 computers in one day.
undefined
NotPetya virus wiped data from computers, including energy firms and government offices.
undefined
Equifax failed to patch a vulnerability, compromising data of over 143 million Americans.
Cyber Kill Chain
A series of steps followed by attackers to infiltrate and exploit a target system.
Security Operations Center (SOC)
A team of IT security professionals that monitors an organization's IT infrastructure to detect cybersecurity events.
Security Posture
The readiness of an organization to protect its assets from cyber threats.
SOC Activities and Responsibilities
Preparation, planning, and prevention; monitoring, detection, and response; recovery, refinement, and compliance.
SOC Team Members
Incident Responder, Forensic Investigator, Compliance Auditor, Security Analyst, Security Engineer, Threat Hunter, SOC Manager, SOC Operator, Malware Analyst, Security Awareness Trainer.