Notecards for Testout Security Pro Chapter 2 - Threats, Attacks, and Vulnerabilities, 2023.
Targeted attack
A type of threat in which threat actors actively pursue and compromise a target entity's infrastructure while maintaining anonymity
Opportunistic attack
An attack in which the threat actor is almost always trying to make money as fast as possible and with minimal effort
Insider
A threat agent who has authorized access to an organization and either intentionally or unintentionally carries out an attack
Competitor
A threat agent who carries out attacks on behalf of an organization and targets competing companies
Hacker
Any threat agent who uses technical knowledge to bypass security, exploit a vulnerability, and gain access to protected information
Cybercriminal
A subcategory of hacker threat agents. They are willing to take more risks and use more extreme tactics for financial gain
Nation state
A sovereign state threat agent that may wage an all-out war on a target and have significant resources for the attack
Internal threat
A threat from authorized individuals (insiders) who exploit assigned privileges and inside information to carry out an attack
External threat
A threat from individuals or groups not associated with the organization, who seek to gain unauthorized access to data
Persistent threat
A threat that seeks to gain access to a network and remain there undetected
Non-persistent threat
A threat that focuses on getting into a system and stealing information. It is usually a one-time event, so the attacker is not concerned with detection
Open-source intelligence (OSINT)
Information that is readily available to the public and doesn't require any type of malicious activity to obtain
White hat
A skilled hacker who uses skills and knowledge for defensive purposes only. This hacker interacts only with systems for which express access permission is given
Black hat
A skilled hacker who uses skills and knowledge for illegal or malicious purposes
Gray hat
A skilled hacker who falls in the middle of white hat and black hat hackers. They may cross the line of what is ethical, but usually has good intentions and isn't malicious like a black hat hacker
Malware
Software designed to take over or damage a computer without the user's knowledge or approval
Virus
A program that attempts to damage a computer system and replicate itself to other computer systems
Worm
A self-replicating malware program
Trojan horse
A malicious program that is disguised as legitimate or desirable software
Zombie
A computer that is infected with malware and is controlled by a command and control center called a zombie master
Botnet
A group of zombie computers that are commanded from a central control infrastructure
Rootkit
A set of programs that allows attackers to maintain hidden, administrator-level access to a computer
Logic bomb
Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met
Spyware
Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer
Adware
Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences
Ransomware
Malware that denies access to a computer system until the user pays a ransom
Scareware
A scam to fool a user into thinking there is some form of malware on the system
Crimeware
Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers
Crypto-malware
Ransomware that encrypts files until a ransom is paid
Remote access Trojan (RAT)
Malware that includes a back door to allow a hacker administrative control over the target computer
Hacker
A person who commits crimes through gaining unauthorized access to computer systems
Cracker
A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures
Script kiddy
A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses
Potentially unwanted program (PUP)
ā¦is a software inadvertently installed that contains adware, installs toolbars, or has other objectives
Fileless virus
ā¦uses legitimate programs to infect a computer
Social engineering
An attack involving human interaction to obtain information or access
Footprinting
Uses social engineering to obtain as much information as possible about an organization
Pretexting
A fictitious scenario to persuade someone to perform an action or give information
Elicitation
A technique to extract information from a target without arousing suspicion
Preloading
Influencing a target thoughts, opinions, and emotions before something happens
SMiShing
Doing phishing through an SMS message. Tricking a user to download a virus, Trojan horse, or malware onto a cell phone
Impersonation
Pretending to be somebody else and approaching a target to extract information
SPIM
ā¦is similar to spam, but the malicious link is sent to the target over instant messaging instead of email
Hoax
A type of malicious email with some type of urgent or alarming message to deceive the target
Hacktivist
A hacker with a political motive
Ignorance
ā¦means the target is not educated in social engineering tactics and prevention, so the target doesn't recognize social engineering when it is happening
Shoulder surfing
Looking over someone's shoulder while that person works on a computer or reviews documents
Eavesdropping
An unauthorized person listening to private conversations between employees or other authorized personnel when sensitive topics are being discussed
Keyloggers
A device used to steal data through by capturing what the user types
Feigning ignorance
Make a wrong statement and then admit to not knowing much about the subject in hopes the target will reveal the needed information
Spear phishing
Gathers information about the victim, such as the online bank
Whaling
ā¦is another form of phishing. It targets senior executives and high-profile victims
Vishing
ā¦is like phishing, but instead of an email, the attacker uses Voice over IP (VoIP) to gain sensitive information. The term is a combination of voice and phishing
Pharming
Executing malicious programs on the target's computer so that any URL traffic redirects to the attacker's malicious website
Social networking
Many attackers are turning to applications such as Facebook, Twitter, Instagram, to steal identities and information. Also, many attackers use social media to scam users. These scams are designed to entice the user to click a link that brings up a malicious site the attacker controls. Usually, the site requests personal information and sensitive data, such as an email address or credit card number
Zero-day vulnerability
ā¦is a software vulnerability that is unknown to the vendor
Data loss
The loss of files and documents either accidentally or through malicious acts
Data breach
The exposure of confidential or protected data, either accidentally or through malicious acts
Data exfiltration
The unauthorized transfer of information or files from a computer
Identity theft
A crime in which an attacker commits fraud by using someone else's name or existing accounts to obtain money or to purchase items
Availability loss
Loss of access to computer resources due to the network being overwhelmed or crashing