1.1 AP Cybersecurity

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Reconnaissance

The planning phase. Researching the target (e.g., scanning networks, looking up employees on LinkedIn).

2
New cards

Initial Access

Getting a foothold. The first breach (e.g., phishing email, exploiting a vulnerability, weak password).

3
New cards

Persistence

Staying in. Creating a backdoor (e.g., installing malware that runs every time the computer starts).

4
New cards

Lateral Movement

Exploring the network. Moving from one system to another to find valuable data (e.g., accessing the HR server from a marketing computer).

5
New cards

Taking Action

The end goal. Stealing data, encrypting files for ransom, destroying systems. Also called Impact.

6
New cards

Evading Detection

Covering their tracks. Deleting logs, hiding files, using encryption to avoid being found.

7
New cards

Authority


Impersonating someone in charge (e.g., "This is the IT Director, I need your password now.").

8
New cards

Intimidation

Using threats or fear (e.g., "If you don't pay this fake fine, you will be arrested.").

9
New cards

Consensus/Social Proof

"Everyone else is doing it" (e.g., "All your colleagues have already updated their credentials through this link.").

10
New cards

Familiarity/Liking

Pretending to be a friend or shared connection (e.g., "Hey, it's me from the conference! Click this.").

11
New cards

Scarcity

"Limited time offer!" (e.g., "Act now to claim your exclusive prize before it's gone!").

12
New cards

Urgency

Creating a time-sensitive emergency (e.g., "Your account will be deleted in 5 minutes if you don't verify!").

13
New cards

Script Kiddie


Low skill
, uses others' tools. Motivated by notoriety and fun. The "spray-and-pray" attacker.

14
New cards

Hacktivist

Motivated by a political or social cause (e.g., environment, human rights). Goal is to send a message or disrupt for their ideology.

15
New cards

Insider Threat

The attacker is already inside the organization. Motivated by revenge, money, or ideology. Has legitimate access.

16
New cards

Cyberterrorist

Motivated by ideology/politics to cause widespread fear, disruption, or physical harm (e.g., attacking power grids).

17
New cards

Transnational Criminal Organization

Highly organized for financial gain. Focus on ransomware, stealing IP, fraud. Like a digital mafia.

18
New cards

State Adversary

Government-backed, highly skilled, well-funded. Goal is espionage, sabotage, or influencing geopolitics.

19
New cards