Foundations of cybersecurity Mod 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Adversarial artificial intelligence (AI)

A technique that manipulates AI and machine-learning technology to conduct attacks more efficiently.

2
New cards

Business Email Compromise (BEC)

A phishing attack in which a threat actor impersonates a trusted source to gain financial advantage.

3
New cards

CISSP

Certified Information Systems Security Professional— a globally recognized information-security certification awarded by (ISC)².

4
New cards

Computer virus

Malicious code written to interfere with computer operations and damage data or software.

5
New cards

Cryptographic attack

An attack aimed at compromising secure communications between a sender and intended recipient.

6
New cards

Hacker

A person who uses computers to gain unauthorized access to systems, networks, or data.

7
New cards

Malware

Software designed to harm devices or networks.

8
New cards

Password attack

An attempt to gain access to password secured devices, systems, networks, or data.

9
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

10
New cards

Physical attack

A security incident that impacts both digital assets and the physical environment where it occurs.

11
New cards

Physical social engineering

An attack where a threat actor impersonates an employee, vendor, or customer to gain unauthorized physical access.

12
New cards

Social engineering

A manipulation technique that exploits human error to obtain private information, access, or valuables.

13
New cards

Social media phishing

An attack in which a threat actor gathers detailed information about a target from social media before striking.

14
New cards

Spear phishing

A malicious email attack targeting a specific user or group, appearing to come from a trusted source.

15
New cards

Supply-chain attack

An attack that targets systems, applications, hardware, or software in the supply chain to introduce malware.

16
New cards

USB baiting

An attack where a threat actor leaves a malware-infected USB drive for someone to plug in, compromising the network.

17
New cards

Vishing

Exploiting voice communication channels to obtain sensitive information or impersonate a trusted source.

18
New cards

Watering hole attack

Compromising a website frequently visited by a specific group of users to infect their systems.