Cybersecurity H Unit 2

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Security Vulnerability

Any type of hardware or software defect that malicious users attempt to exploit.

2
New cards

Exploit

A program written to take advantage of a known security vulnerability.

3
New cards

Cyberattack

The act of using an exploit against a vulnerability with the goal of breaking into the target system.

4
New cards

Software Vulnerabilities

Usually caused by errors in operating system or application code.

5
New cards

Security Patches and Updates

Released by operating system and application producers to avoid exploitation of vulnerabilities.

6
New cards

Project Zero

Created by Google, this is an example of a third-party permanent team of researchers that is dedicated to finding software vulnerabilities.

7
New cards

Hardware Vulnerabilities

Security weaknesses caused by design flaws in computer devices and components. They are usually limited to specific device models and are commonly exploited through targeted attacks.

8
New cards

Buffer Overflow

A software vulnerability that occurs when data is written beyond the limits of memory areas that are allocated to an application. This vulnerability can cause an application to access memory that is allocate to other processes.

9
New cards

Non-Validated Input

A vulnerability in which data supplied to a program by a user or exploit causes the application to behave in an unintended way.

10
New cards

Race Conditions

A vulnerability that occurs when an ordered or times set of processes is disrupted or altered by an exploit.

11
New cards

Access-Control Problems

Improper use of practices that manage physical control of equipment, data, or applications.

12
New cards

Malware

Any computer code that can be used to steal data, bypass access controls, or harm or compromise a system.

13
New cards

Spyware

Malware designed to track the actions of users and capture data.

14
New cards

Adware

Software that automatically delivers advertisements. Some types contain spyware.

15
New cards

Bot

Malware designed to automatically perform actions over the internet.

16
New cards

Ransomware

A type of malware that holds a computer system captive, frequently by encrypting essential data, until a payment is made to the attacker.

17
New cards

Rootkit

Malware designed to modify operating systems to allow unauthorized remote access through a backdoor. Rootkits can modify user privileges, system files and system forensics and monitoring tools, which makes them extremely difficult to detect and remove.

18
New cards

Virus

Malicious executable code that can be attached to legitimate programs. Viruses usually require end user activation and can be relatively harmless or very destructive. They frequently spread by USB drives, optical media, network shares, or email.

19
New cards

Trojan Horse

Malware that carries out malicious operations while appearing to have a desired function. They are included in non-executable files, unlike viruses, which are executable.

20
New cards

Worms

Malware in the form of malicious code that replicated itself independently by exploiting vulnerabilities in networks. They spread very rapidly over a network because they run by themselves. All share similar patterns including an enabling vulnerability, a way to propagate themselves, and a payload.

21
New cards

Man-In-The-Middle (MitM)

A technique in which an attacker can take control of a device without the owner’s knowledge. The attacker can intercept and capture information that passes through the device on its way to another destination.

22
New cards

Man-In-The-Mobile (MitMO)

An attach that is a variation of (MitM). A mobile device is infected with malware that takes control of the device and causes it to forward sensitive information to attackers.

23
New cards

Social Engineering

A way of gaining access to resources that manipulated individuals into performing actions of divulging confidential information. Attackers attempt to exploit our willingness to help or exploit our weaknesses.

24
New cards

Pretexting

A type of social engineering attack in which an individual lies in order to gain access to privileged information.

25
New cards

Tailgating

A type of social engineering attack in which an attacker follows an authorized person into a secure location.

26
New cards

Something for Something

A type of social engineering attach in which an attacker requests personal information in exchange for something such as a free gift.

27
New cards

Wi-Fi Password Cracking

The act of discovering a password that is used to protect a wireless network.

28
New cards

Brute-Force Attacks

The use of a software program to challenge a password repeatedly with all the possible values that could be used for a password, or with a list of words that are commonly used in passwords. Complex passwords are much more difficult to guess.

29
New cards

Network Sniffing

The use of software to capture packets on a wireless network. Unencrypted passwords can be captured and used in an attack, and encrypted passwords could be cracked with a software tool.

30
New cards

Phishing

Use of a generic fraudulent email that appears to be send by a legitimate source. The email tricks people into installing malware or sharing confidential information.

31
New cards

Spear Phishing

A highly targeted attack in which emails that appear to be sent from a legitimate source are customized for specific persons. An attackers researches the interests of the target in order to create an email that tricks that specific person.

32
New cards

Vulnerability Exploitation

The use of various methods, including software tools or social engineering, to gain information about a system. This attacker uses this information to find weaknesses that exist in that specific system.

33
New cards

Advanced Persistent Threat (APT)

A multi-phase, long term, stealthy, and advanced attack against a specific target. APTs are complex and require a high level of skill, so the attacks are usually well-funded and target organizations or nations for business or political reasons. They usually involve network-based espionage that uses malware that is undetected on the target systems.

34
New cards

Whois

A public internet database that contains information about Internet domain names and the people or organizations that registered the domains. It is a source of information that can be used to exploit system vulnerabilities..

35
New cards

nmap

A popular port scanning tool that can be used to discover vulnerabilities in networked systems.

36
New cards

Denial-of-Service (DoS)

An attack that interrupts network services to user, devices, or applications.

37
New cards

Overwhelming Quantity of Traffic

A DoS attack in which an enormous number of packets are sent to a network at a rate that the network systems cannot handle. This results in a slowdown of network transmission or response, or the crash of a device or service.

38
New cards

Maliciously Formatted Packets

The use of network data structures that have been created to disrupt the operation of network devices.

39
New cards

Distributed Denial-of-Service (DDoS)

The use of multiple distributed systems to send data that disrupts services provided by networks and network devices.

40
New cards

Botnet

A network of distributed infected hosts that is used to launch a DDoS attack.

41
New cards

Search Engine Optimization (SEO) Poisoning

The manipulation of the ranking of a malicious website in order to attract users to the site so that malicious code will be distributed or social engineering can be used to gather confidential information.

42
New cards

Blended Attack

The use of multiple techniques to compromise a target.

43
New cards

Impact Reduction

The use of techniques to limit the damage caused by a successful attack. These techniques included ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks.