External Threats in Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key concepts related to external threats in cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Social Engineering

Tricking someone into revealing private information by using human psychology and social techniques.

2
New cards

Phishing

A method where an electronic message is sent to an individual, asking them to click on a link or reply with information, often to steal confidential data or infect their computer.

3
New cards

Shoulder Surfing

Observing someone entering sensitive information, such as a PIN or password, to steal it.

4
New cards

Malware

Malicious software designed to damage or disrupt systems; includes viruses, worms, Trojans, and more.

5
New cards

Virus

A type of malware that spreads from computer to computer, attaching itself to legitimate software or files.

6
New cards

Worm

A type of malware similar to a virus but does not need to attach to other programs or files to spread.

7
New cards

Trojan

Malicious code disguised as legitimate software, containing a harmful payload.

8
New cards

Botnet

A network of computers controlled by attackers to carry out large-scale attacks, such as Denial of Service.

9
New cards

Ransomware

Malware that encrypts local files and demands payment for the decryption.

10
New cards

Hacking

Gaining unauthorized access to a system, often through social engineering techniques.

11
New cards

White Hat Hackers

Security professionals who find and fix vulnerabilities in systems.

12
New cards

Black Hat Hackers

Malicious individuals who exploit systems for personal gain.

13
New cards

Denial of Service Attack

An attack that floods servers with traffic to overwhelm resources, making services slow or unusable.

14
New cards

DDoS Attack

Distributed Denial of Service attack where the assault comes from multiple computers, often via botnets.

15
New cards

Pharming

A technique that misdirects users to a fake website without their knowledge, often by modifying DNS settings.

16
New cards

Man-in-the-Middle Attack

An attack where an attacker intercepts communication between two parties to steal data.