Adv Cybersec Unit 1

studied byStudied by 7 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

Non-repudiation

1 / 20

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

21 Terms

1

Non-repudiation

Provides validation of message origin

New cards
2

Asset

Something that has value to an individual or organization

New cards
3

Threat

Anything that can potentially lead to the loss of an asset

New cards
4

Threat agent

Person or entity that attempts or carries out a threat

New cards
5

Layered Security

Security approach that combines multiple security controls and defenses to create a cumulative effect

New cards
6

Bottom Layer of LS Model

Policies, procedures, awareness

New cards
7

Top Layer of LS Model

Data

New cards
8

Credential Harvesting

Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)

New cards
9

Trojan Horse

Malware that downloads onto a computer disguised as a legitimate program

New cards
10

Worm

Malware or malicious software that can replicate rapidly and spread across devices in a network

New cards
11

Virus

Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software

New cards
12

RAT (Remote Access Trojan)

Malware designed to allow an attacker to remotely control an infected computer

New cards
13

Rootkit

Set of software tools that enables an unauthorized user to gain control of a computer system without being detected

New cards
14

Spyware

Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive

New cards
15

Bots

A software application programmed to execute specific tasks as part of another computer program or to simulate human activity

New cards
16

Botnets

A network of computers infected by malware that are under the control of a single attacking party

New cards
17

Logic Bombs

A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer

New cards
18

Password attack

When a hacker tries to steal your password

New cards
19

Physical attack

Security breach that impacts operations, damages property, or impacts physical environment

New cards
20

Cloud-based attack

Cyber attack that targets cloud-based service platforms

New cards
21

On-premise attack

Security threats that target on-premise systems and services, such as local servers and desktop computers

New cards

Explore top notes

note Note
studied byStudied by 38 people
955 days ago
5.0(2)
note Note
studied byStudied by 5 people
667 days ago
5.0(1)
note Note
studied byStudied by 21 people
51 days ago
5.0(1)
note Note
studied byStudied by 5 people
92 days ago
5.0(1)
note Note
studied byStudied by 11 people
713 days ago
5.0(1)
note Note
studied byStudied by 6 people
755 days ago
5.0(1)
note Note
studied byStudied by 50 people
755 days ago
5.0(1)
note Note
studied byStudied by 26 people
256 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (72)
studied byStudied by 9 people
486 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 9 people
339 days ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 16 people
633 days ago
5.0(3)
flashcards Flashcard (29)
studied byStudied by 10 people
392 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 26 people
660 days ago
5.0(2)
flashcards Flashcard (42)
studied byStudied by 7 people
699 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 5 people
743 days ago
5.0(1)
flashcards Flashcard (75)
studied byStudied by 53 people
1 day ago
5.0(2)
robot