Domain 1.0 Threat/Attacks

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 241

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

242 Terms

1

Phishing

A fraudulent practice where an attacker sends a message to trick a person into revealing sensitive information or deploying malicious software.

New cards
2

Spear Phishing

Targeted phishing attack on a group of people or specific individual.

New cards
3

Vishing

Social engineering over the telephone to extort information.

New cards
4

SMiShing

Phishing attack using SMS text messages.

New cards
5

Whaling

Attack targeting a CEO or high-level executive.

New cards
6

Credential Harvesting

Phishing attack to gather usernames & passwords.

New cards
7

Pretexting

Social engineering attack involving creating a scenario to trick victims into giving private information.

New cards
8

Elicit Information

Attacker tries to get information by making false statements or using flattery.

New cards
9

Tailgating

Following someone through a secure door to gain unauthorized access.

New cards
10

Dumpster Diving

Searching trash for Personally Identifiable Information to commit fraud.

New cards
11

Shoulder surfing

Viewing sensitive information by standing behind someone using a computer.

New cards
12

Hoax

Spreading false information like fake virus alerts or chain letters.

New cards
13

Pharming

DNS redirecting attack to manipulate website traffic.

New cards
14

Spam

Unsolicited bulk messages sent through digital communication tools.

New cards
15

Impersonation

Pretending to be someone else to gain information.

New cards
16

Invoice Scams

Criminals changing bank details on genuine invoices for payment.

New cards
17

Reconnaissance

Preliminary survey to gain information, passive or active.

New cards
18

Reconnaissance

A preliminary survey to gain information, including exploratory military surveys of enemy territory.

New cards
19

Passive Reconnaissance

Attacker researches a company and collects information for later use.

New cards
20

Active Reconnaissance

Attackers interact with the user or their desktop, attempting actions like password resets or altering registries.

New cards
21

Water Hole attack

Attackers infect websites frequented by a specific industry to spread malware and target individuals.

New cards
22

Credential Harvesting

An attack, often through phishing, where victims are tricked into providing their account details on fake web pages.

New cards
23

Influence Campaigns

Large-scale campaigns using disinformation to influence public opinion, often carried out by groups with high capabilities.

New cards
24

Social Media

Part of Influence Campaigns, used worldwide to influence voters, especially on platforms like Facebook and Twitter.

New cards
25

Hybrid Warfare

A mix of conventional and unconventional methods used in Influence Campaigns by state actors to achieve political objectives.

New cards
26

Typosquatting

URL hijacking where websites are intentionally misspelled to deceive users.

New cards
27

Prepending

Adding something to the beginning of a URL, often used by attackers to redirect users.

New cards
28

Authority (Principles

reason for effectiveness):Emails from higher authorities like CEOs to manipulate individuals into complying.

New cards
29

Intimidation (Principles

reason for effectiveness):Pretending to be a figure of authority to threaten individuals into compliance.

New cards
30

Consensus (Principles

reason for effectiveness):Manipulating individuals by stating others have already provided information, creating social pressure.

New cards
31

Scarcity (Principles

reason for effectiveness):Creating urgency by making victims believe there is limited time or availability.

New cards
32

Familiarity & Trust (Principles

reason for effectiveness):Hackers build trust with victims to gain access to restricted areas within a company.

New cards
33

Urgency (Principles

reason for effectiveness):Creating a sense of urgency to manipulate individuals into providing access quickly.

New cards
34

Urgency

The principle of creating a sense of immediate need or emergency to manipulate individuals into providing access or information quickly.

New cards
35

Identity Fraud

Occurs when someone steals Personally Identifiable Information (PII) to commit fraud or take control of accounts, often through methods like pretexting and phishing.

New cards
36

Physical Attacks in Cyber Security

Include malicious USB cables, flash drives, card cloning (skimming), and other methods to compromise systems physically.

New cards
37

Ransomware

Involves encrypting files on a user's computer and demanding money for decryption, often disguised as legitimate software or programs.

New cards
38

Trojans

Malware that disguises itself as legitimate software, downloads onto a computer, and can exploit system vulnerabilities to carry out malicious actions.

New cards
39

Worms

Self-replicating malware that spreads to infect other computers, exploiting security weaknesses in networking protocols.

New cards
40

Potentially Unwanted Programs (PUPs)

Programs downloaded with other software that consume resources and slow down computers, often detected by security tools like Malwarebytes.

New cards
41

Fileless Virus

A virus that operates in memory, making detection difficult by piggybacking on legitimate programs or applications.

New cards
42

Command and Control Malware

Malware that takes complete control of a computer, allowing attackers to steal data, shut down systems, or launch attacks.

New cards
43

Bots

Malware that infects and controls computers remotely, carrying out commands under the attacker's control.

New cards
44

Botnet

A collection of bots used for malicious purposes, often to conduct Distributed Denial of Service (DDoS) attacks.

New cards
45

Crypto-Malware

Ransomware that encrypts data and remains undetected for extended periods, demanding ransom for decryption.

New cards
46

Logic Bombs

Malicious code triggered by specific actions or dates, designed to execute harmful functions.

New cards
47

Spyware

Malware that monitors and tracks user activity, collecting sensitive information to send to third parties.

New cards
48

Rootkit

Malicious tools that provide attackers remote access and control over systems, often remaining hidden and active.

New cards
49

Keylogger

Malware that tracks and logs keystrokes, sending the data to attackers for unauthorized access.

New cards
50

RAT

Remote Access Trojan, a malware program that sends login details to attackers for full control over a computer.

New cards
51

Malware

Any harmful software or program intentionally designed to damage computers, networks, or servers.

New cards
52

Backdoor

Undocumented access to a system created for legitimate purposes but exploited by attackers for unauthorized access.

New cards
53

Dictionary Attack

Method of breaking into password-protected systems by systematically trying every word in a dictionary as a password.

New cards
54

Brute Force Attack

Hacking method using trial and error to guess passwords by testing all possible combinations, often effective but time-consuming.

New cards
55

Spraying Attacks

A type of brute force attack where common passwords are tried against a list of usernames to gain unauthorized access.

New cards
56

Plain Text / Unencrypted

Passwords stored in plain text that are vulnerable to being cracked by brute force attacks.

New cards
57

Rainbow Table

A database used to crack password hashes by matching plaintext passwords to their hash values.

New cards
58

Malicious USB (Universal Serial Bus) Cable

Cables with built-in WiFi chips used to run malicious commands on devices when connected.

New cards
59

Malicious Flash Drive (USB Drive)

USB drives containing malicious code that, when inserted into a computer, can give attackers control over the system.

New cards
60

Card Cloning (Skimming)

Unauthorized copying of credit card information through devices like card cloning machines, often found in ATMs or restaurants.

New cards
61

Tainted Training Data for Machine Learning

Manipulating machine learning models by training them to ignore certain attacks, compromising security.

New cards
62

Security of Machine Learning Algorithms

Using machine learning to identify patterns and detect attacks in encrypted data without decrypting it.

New cards
63

Supply Chain Attacks

Targeting the suppliers of large companies to compromise their systems, emphasizing the importance of securing the entire supply chain.

New cards
64

Cloud vs On-Premise Defense against attacks

Cloud environments use a "Zero-Trust" model requiring user/device identification, while on-premise companies rely on physical security measures like perimeter fencing and security guards.

New cards
65

Birthday Attack

A cryptographic attack exploiting hash collisions, based on the Birthday Paradox in Probability Theory, where two different inputs produce the same hash value.

New cards
66

Collision Attack

An attack on a cryptographic hash function finding two different inputs producing the same hash value, undermining the security provided by the hash.

New cards
67

Downgrade Attack

A cyber attack forcing a switch from a higher to a lower level of security, like redirecting from HTTPS to HTTP, often used in man-in-the-middle attacks.

New cards
68

SmiShing

Using SMS text messages for attacks.

New cards
69

Privilege Escalation Attack

An attack granting unauthorized higher permissions, either vertically (to higher privilege accounts) or horizontally (to similar privilege accounts).

New cards
70

XSS

Cross-Site Scripting attacks involve injecting malicious scripts into web applications, exploiting lack of validation and encoding, allowing various attacks.

New cards
71

SQL Injection Attack

Unauthorized access to a database through unexpected input to a web application, exploiting vulnerabilities in SQL commands.

New cards
72

How to prevent SQL injections

Prevention methods include input validation, prepared statements, and limiting account privileges, with stored procedures being an effective countermeasure.

New cards
73

What can the strcpy() command do? The strcpy() function copies a string to a buffer, potentially causing buffer overflow due to its inability to limit characters.

New cards
74

DLL Injection Attack

Forcing a process to load a DLL to run code within another process, altering its behavior.

New cards
75

API Attacks

Attempts to manipulate APIs for additional resources, data access, or service interruption, including MITM, DDoS, and API injection attacks.

New cards
76

LDAP Injection Attack

Inserting data into LDAP statements to bypass authentication, elevate privileges, disclose resources, or conduct blind attacks.

New cards
77

How to prevent LDAP injection attacks

Input validation is crucial to prevent LDAP injection attacks.

New cards
78

XML Injection Attack

Manipulating XML scripts to carry out attacks, similar to XSS, by exploiting XPath queries.

New cards
79

How an XSS attack can be conducted

XSS attacks can be conducted using script attributes, encoded URI schemes, and code encoding to execute malicious scripts.

New cards
80

How to prevent XML injection attacks

Prevent XML injection attacks by using input validation.

New cards
81

Buffer overflow attack

Writing excessive data into an application's memory, causing data spillage into other memory areas due to lack of input validation.

New cards
82

Input Validation

Ensures only properly formatted data enters a software system, preventing various attacks like SQL injections, XML injections, and buffer overflow attacks.

New cards
83

Integer Overflow

A condition where the result of an arithmetic operation exceeds the maximum size of the integer type used to store it.

New cards
84

Pass the Hash Attack

Technique where an attacker captures a password hash for authentication and lateral access to other systems without decrypting it.

New cards
85

Resource Exhaustion

An attack consuming all available memory and CPU cores, leading to application or system crashes.

New cards
86

SSL Stripping Attacks

Downgrading a secure HTTPS connection to HTTP, making communications unencrypted and vulnerable to MITM attacks.

New cards
87

Memory Leak

When an application consumes memory without releasing it, leading to system crashes due to resource exhaustion.

New cards
88

Pointer/Object Dereference

Attacker causes an application's memory reference to point to a null part, often leading to crashes or DOS attacks.

New cards
89

Directory Traversal Attack

Exploiting a website vulnerability to access restricted directories and execute commands outside the root directory.

New cards
90

Race Conditions (TOCTOU) Attack

Exploiting the time gap between checking and using data to carry out unauthorized actions in software.

New cards
91

Error Handling

Procedures to respond to error conditions in software applications, crucial for good coding practice and security.

New cards
92

Improper Input Handling

Failure to validate input properly, leaving applications vulnerable to malicious data injection.

New cards
93

Replay Attack (Session Replays)

Intercepting and resending network information to misdirect receivers into unauthorized actions.

New cards
94

Driver Manipulation

Manipulating device drivers to compromise system security, using techniques like shimming and refactoring.

New cards
95

Shimming

Intercepting API calls to change arguments, handle operations, or redirect requests, often used in malware to bypass security.

New cards
96

Refactoring

Changing application code to avoid detection by antivirus software while retaining attack functionality, a technique used in malware.

New cards
97

Injections

Adding data to an application's data stream to alter the meaning of commands sent to an interpreter.

New cards
98

Types of Wireless Attacks

Evil Twin, Rogue Access Point, and Disassociation attacks targeting wireless networks for unauthorized access or disruption.

New cards
99

Bluejacking

Sending unsolicited messages via Bluetooth to annoy or potentially threaten device users within a certain radius.

New cards
100

Bluesnarfing

Illegally accessing and stealing information from wireless devices through Bluetooth connections, posing a high-security risk.

New cards
robot