Adv Cybersec Unit 1

studied byStudied by 7 people
5.0(1)
Get a hint
Hint

Non-repudiation

1 / 20

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

21 Terms

1

Non-repudiation

Provides validation of message origin

New cards
2

Asset

Something that has value to an individual or organization

New cards
3

Threat

Anything that can potentially lead to the loss of an asset

New cards
4

Threat agent

Person or entity that attempts or carries out a threat

New cards
5

Layered Security

Security approach that combines multiple security controls and defenses to create a cumulative effect

New cards
6

Bottom Layer of LS Model

Policies, procedures, awareness

New cards
7

Top Layer of LS Model

Data

New cards
8

Credential Harvesting

Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)

New cards
9

Trojan Horse

Malware that downloads onto a computer disguised as a legitimate program

New cards
10

Worm

Malware or malicious software that can replicate rapidly and spread across devices in a network

New cards
11

Virus

Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software

New cards
12

RAT (Remote Access Trojan)

Malware designed to allow an attacker to remotely control an infected computer

New cards
13

Rootkit

Set of software tools that enables an unauthorized user to gain control of a computer system without being detected

New cards
14

Spyware

Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive

New cards
15

Bots

A software application programmed to execute specific tasks as part of another computer program or to simulate human activity

New cards
16

Botnets

A network of computers infected by malware that are under the control of a single attacking party

New cards
17

Logic Bombs

A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer

New cards
18

Password attack

When a hacker tries to steal your password

New cards
19

Physical attack

Security breach that impacts operations, damages property, or impacts physical environment

New cards
20

Cloud-based attack

Cyber attack that targets cloud-based service platforms

New cards
21

On-premise attack

Security threats that target on-premise systems and services, such as local servers and desktop computers

New cards

Explore top notes

note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 175 people
Updated ... ago
5.0 Stars(9)
note Note
studied byStudied by 57 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 22444 people
Updated ... ago
4.9 Stars(114)

Explore top flashcards

flashcards Flashcard60 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard160 terms
studied byStudied by 60 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 29 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard20 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 85 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard24 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard88 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(3)