Identify: Methods of attack

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Malware

A software designed to harm devices or networks

2
New cards

Virus

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

3
New cards

Worm

Malware that self-replicates, spreading across the network and infecting computers

4
New cards

Ransomware

A malicious attack during which threat actors encrypt an organization's data and demand payment to restore access

5
New cards

Spyware

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

6
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

7
New cards

Spear phishing

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

8
New cards

Whaling

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

9
New cards

Business Email Compromise (BEC)

An attack in which a threat actor impersonates a known source to obtain a financial advantage

10
New cards

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

11
New cards

Social Engineering

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

12
New cards

Social Media Phishing

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

13
New cards

Watering hole attack

An attack in which a threat actor compromises a website frequently visited by a specific group of users

14
New cards

Physical Social Engineering

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

15
New cards

USB baiting

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network