Cybersecurity H Unit 2

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Security Vulnerability

1 / 42

flashcard set

Earn XP

43 Terms

1

Security Vulnerability

Any type of hardware or software defect that malicious users attempt to exploit.

New cards
2

Exploit

A program written to take advantage of a known security vulnerability.

New cards
3

Cyberattack

The act of using an exploit against a vulnerability with the goal of breaking into the target system.

New cards
4

Software Vulnerabilities

Usually caused by errors in operating system or application code.

New cards
5

Security Patches and Updates

Released by operating system and application producers to avoid exploitation of vulnerabilities.

New cards
6

Project Zero

Created by Google, this is an example of a third-party permanent team of researchers that is dedicated to finding software vulnerabilities.

New cards
7

Hardware Vulnerabilities

Security weaknesses caused by design flaws in computer devices and components. They are usually limited to specific device models and are commonly exploited through targeted attacks.

New cards
8

Buffer Overflow

A software vulnerability that occurs when data is written beyond the limits of memory areas that are allocated to an application. This vulnerability can cause an application to access memory that is allocate to other processes.

New cards
9

Non-Validated Input

A vulnerability in which data supplied to a program by a user or exploit causes the application to behave in an unintended way.

New cards
10

Race Conditions

A vulnerability that occurs when an ordered or times set of processes is disrupted or altered by an exploit.

New cards
11

Access-Control Problems

Improper use of practices that manage physical control of equipment, data, or applications.

New cards
12

Malware

Any computer code that can be used to steal data, bypass access controls, or harm or compromise a system.

New cards
13

Spyware

Malware designed to track the actions of users and capture data.

New cards
14

Adware

Software that automatically delivers advertisements. Some types contain spyware.

New cards
15

Bot

Malware designed to automatically perform actions over the internet.

New cards
16

Ransomware

A type of malware that holds a computer system captive, frequently by encrypting essential data, until a payment is made to the attacker.

New cards
17

Rootkit

Malware designed to modify operating systems to allow unauthorized remote access through a backdoor. Rootkits can modify user privileges, system files and system forensics and monitoring tools, which makes them extremely difficult to detect and remove.

New cards
18

Virus

Malicious executable code that can be attached to legitimate programs. Viruses usually require end user activation and can be relatively harmless or very destructive. They frequently spread by USB drives, optical media, network shares, or email.

New cards
19

Trojan Horse

Malware that carries out malicious operations while appearing to have a desired function. They are included in non-executable files, unlike viruses, which are executable.

New cards
20

Worms

Malware in the form of malicious code that replicated itself independently by exploiting vulnerabilities in networks. They spread very rapidly over a network because they run by themselves. All share similar patterns including an enabling vulnerability, a way to propagate themselves, and a payload.

New cards
21

Man-In-The-Middle (MitM)

A technique in which an attacker can take control of a device without the owner’s knowledge. The attacker can intercept and capture information that passes through the device on its way to another destination.

New cards
22

Man-In-The-Mobile (MitMO)

An attach that is a variation of (MitM). A mobile device is infected with malware that takes control of the device and causes it to forward sensitive information to attackers.

New cards
23

Social Engineering

A way of gaining access to resources that manipulated individuals into performing actions of divulging confidential information. Attackers attempt to exploit our willingness to help or exploit our weaknesses.

New cards
24

Pretexting

A type of social engineering attack in which an individual lies in order to gain access to privileged information.

New cards
25

Tailgating

A type of social engineering attack in which an attacker follows an authorized person into a secure location.

New cards
26

Something for Something

A type of social engineering attach in which an attacker requests personal information in exchange for something such as a free gift.

New cards
27

Wi-Fi Password Cracking

The act of discovering a password that is used to protect a wireless network.

New cards
28

Brute-Force Attacks

The use of a software program to challenge a password repeatedly with all the possible values that could be used for a password, or with a list of words that are commonly used in passwords. Complex passwords are much more difficult to guess.

New cards
29

Network Sniffing

The use of software to capture packets on a wireless network. Unencrypted passwords can be captured and used in an attack, and encrypted passwords could be cracked with a software tool.

New cards
30

Phishing

Use of a generic fraudulent email that appears to be send by a legitimate source. The email tricks people into installing malware or sharing confidential information.

New cards
31

Spear Phishing

A highly targeted attack in which emails that appear to be sent from a legitimate source are customized for specific persons. An attackers researches the interests of the target in order to create an email that tricks that specific person.

New cards
32

Vulnerability Exploitation

The use of various methods, including software tools or social engineering, to gain information about a system. This attacker uses this information to find weaknesses that exist in that specific system.

New cards
33

Advanced Persistent Threat (APT)

A multi-phase, long term, stealthy, and advanced attack against a specific target. APTs are complex and require a high level of skill, so the attacks are usually well-funded and target organizations or nations for business or political reasons. They usually involve network-based espionage that uses malware that is undetected on the target systems.

New cards
34

Whois

A public internet database that contains information about Internet domain names and the people or organizations that registered the domains. It is a source of information that can be used to exploit system vulnerabilities..

New cards
35

nmap

A popular port scanning tool that can be used to discover vulnerabilities in networked systems.

New cards
36

Denial-of-Service (DoS)

An attack that interrupts network services to user, devices, or applications.

New cards
37

Overwhelming Quantity of Traffic

A DoS attack in which an enormous number of packets are sent to a network at a rate that the network systems cannot handle. This results in a slowdown of network transmission or response, or the crash of a device or service.

New cards
38

Maliciously Formatted Packets

The use of network data structures that have been created to disrupt the operation of network devices.

New cards
39

Distributed Denial-of-Service (DDoS)

The use of multiple distributed systems to send data that disrupts services provided by networks and network devices.

New cards
40

Botnet

A network of distributed infected hosts that is used to launch a DDoS attack.

New cards
41

Search Engine Optimization (SEO) Poisoning

The manipulation of the ranking of a malicious website in order to attract users to the site so that malicious code will be distributed or social engineering can be used to gather confidential information.

New cards
42

Blended Attack

The use of multiple techniques to compromise a target.

New cards
43

Impact Reduction

The use of techniques to limit the damage caused by a successful attack. These techniques included ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks.

New cards

Explore top notes

note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(1)
note Note
studied byStudied by 154 people
... ago
5.0(2)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 5245 people
... ago
4.6(16)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 4 people
... ago
4.0(1)
flashcards Flashcard (56)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 18 people
... ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 8 people
... ago
4.0(1)
flashcards Flashcard (34)
studied byStudied by 3 people
... ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 6 people
... ago
5.0(1)
robot