Something that has value to an individual or organization
3
New cards
Threat
Anything that can potentially lead to the loss of an asset
4
New cards
Threat agent
Person or entity that attempts or carries out a threat
5
New cards
Layered Security
Security approach that combines multiple security controls and defenses to create a cumulative effect
6
New cards
Bottom Layer of LS Model
Policies, procedures, awareness
7
New cards
Top Layer of LS Model
Data
8
New cards
Credential Harvesting
Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)
9
New cards
Trojan Horse
Malware that downloads onto a computer disguised as a legitimate program
10
New cards
Worm
Malware or malicious software that can replicate rapidly and spread across devices in a network
11
New cards
Virus
Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software
12
New cards
RAT (Remote Access Trojan)
Malware designed to allow an attacker to remotely control an infected computer
13
New cards
Rootkit
Set of software tools that enables an unauthorized user to gain control of a computer system without being detected
14
New cards
Spyware
Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive
15
New cards
Bots
A software application programmed to execute specific tasks as part of another computer program or to simulate human activity
16
New cards
Botnets
A network of computers infected by malware that are under the control of a single attacking party
17
New cards
Logic Bombs
A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer
18
New cards
Password attack
When a hacker tries to steal your password
19
New cards
Physical attack
Security breach that impacts operations, damages property, or impacts physical environment
20
New cards
Cloud-based attack
Cyber attack that targets cloud-based service platforms
21
New cards
On-premise attack
Security threats that target on-premise systems and services, such as local servers and desktop computers