1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Adversarial artificial intelligence (AI)
A technique that manipulates AI and machine-learning technology to conduct attacks more efficiently.
Business Email Compromise (BEC)
A phishing attack in which a threat actor impersonates a trusted source to gain financial advantage.
CISSP
Certified Information Systems Security Professional— a globally recognized information-security certification awarded by (ISC)².
Computer virus
Malicious code written to interfere with computer operations and damage data or software.
Cryptographic attack
An attack aimed at compromising secure communications between a sender and intended recipient.
Hacker
A person who uses computers to gain unauthorized access to systems, networks, or data.
Malware
Software designed to harm devices or networks.
Password attack
An attempt to gain access to password secured devices, systems, networks, or data.
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
Physical attack
A security incident that impacts both digital assets and the physical environment where it occurs.
Physical social engineering
An attack where a threat actor impersonates an employee, vendor, or customer to gain unauthorized physical access.
Social engineering
A manipulation technique that exploits human error to obtain private information, access, or valuables.
Social media phishing
An attack in which a threat actor gathers detailed information about a target from social media before striking.
Spear phishing
A malicious email attack targeting a specific user or group, appearing to come from a trusted source.
Supply-chain attack
An attack that targets systems, applications, hardware, or software in the supply chain to introduce malware.
USB baiting
An attack where a threat actor leaves a malware-infected USB drive for someone to plug in, compromising the network.
Vishing
Exploiting voice communication channels to obtain sensitive information or impersonate a trusted source.
Watering hole attack
Compromising a website frequently visited by a specific group of users to infect their systems.