Cybersecurity Threats and Attacks - Lecture 3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

Vocabulary terms covering basic cybersecurity concepts, threat actors, the MITRE ATT&CK framework, and specific malware types based on the Lecture 3 transcript.

Last updated 8:01 PM on 4/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Vulnerability

A weakness in an asset, such as technology, configuration, or security policy, that leaves it exposed to a threat.

2
New cards

Threat

An event or action that has the potential to take advantage of a vulnerability and impact the asset's CIA (Confidentiality, Integrity, Availability).

3
New cards

Attack

The actual execution of a threat; the process of carrying out a threat against a vulnerability.

4
New cards

Common Vulnerabilities and Exposures (CVE)

The de facto standard for specifying and identifying unique vulnerabilities in software, protocols, or devices.

5
New cards

Supply Chain Attack

A cyber attack that exploits unknown weak links in a processing chain, such as smaller less secure businesses, to target larger companies.

6
New cards

Hacker

A computer programming expert; can be categorized as White-Hat (reports vulnerabilities) or Black-Hat (unauthorized break-ins).

7
New cards

Structured Threat

A threat posed by highly motivated, technically competent attackers who often operate as a business unit to maximize profit.

8
New cards

Unstructured Threat

A threat posed by inexperienced attackers who typically use existing, readily available tools.

9
New cards

MITRE ATT&CK

A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

10
New cards

Tactic (MITRE ATT&CK)

The adversary's technical goals, such as Initial Access, Persistence, or Credential Access.

11
New cards

Technique (MITRE ATT&CK)

The specific way or method an adversary achieves a technical goal; for example, "Brute Force" is a technique under the Credential Access tactic.

12
New cards

Phishing

A technique using emails or malicious links to trick users into providing sensitive information or deploying malware.

13
New cards

Malware

Malicious software designed to infiltrate or damage a computer system, including types like viruses, worms, and Trojans.

14
New cards

Rootkit

A collection of tools that enables administrator-level access to a computer, often very difficult to detect (e.g., Stuxnet).

15
New cards

Ransomware

Malware that encrypts data on a compromised computer and demands payment for the decryption key.

16
New cards

Intrusion Kill Chain

A model developed by Lockheed Martin describing the stages of a cyber attack: Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, C2, and Actions on Objectives.

17
New cards

TrickBot

A computer Trojan malware targeting Microsoft Windows, often used for credential theft and persistence.

18
New cards

Process Hollowing

A process injection technique (T1055.012) where an adversary injects malicious code into a legitimate process like svchost.exe.

Explore top notes

note
Ap Human Georgaphy
Updated 1064d ago
0.0(0)
note
Summary: Arctic and Antartic
Updated 1225d ago
0.0(0)
note
Chp 15: Delivery
Updated 1183d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 916d ago
0.0(0)
note
Microbiomes
Updated 1336d ago
0.0(0)
note
IB PHYSICS Option D: Astrophysics
Updated 598d ago
0.0(0)
note
Ap Human Georgaphy
Updated 1064d ago
0.0(0)
note
Summary: Arctic and Antartic
Updated 1225d ago
0.0(0)
note
Chp 15: Delivery
Updated 1183d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 916d ago
0.0(0)
note
Microbiomes
Updated 1336d ago
0.0(0)
note
IB PHYSICS Option D: Astrophysics
Updated 598d ago
0.0(0)

Explore top flashcards

flashcards
HP - Muscle groups
28
Updated 782d ago
0.0(0)
flashcards
Cells and Cell Functions
32
Updated 1298d ago
0.0(0)
flashcards
Circulatory System
37
Updated 1059d ago
0.0(0)
flashcards
Geography 2
91
Updated 386d ago
0.0(0)
flashcards
EM E2: Infectious Disease
87
Updated 342d ago
0.0(0)
flashcards
Geo5 Final
132
Updated 1219d ago
0.0(0)
flashcards
HP - Muscle groups
28
Updated 782d ago
0.0(0)
flashcards
Cells and Cell Functions
32
Updated 1298d ago
0.0(0)
flashcards
Circulatory System
37
Updated 1059d ago
0.0(0)
flashcards
Geography 2
91
Updated 386d ago
0.0(0)
flashcards
EM E2: Infectious Disease
87
Updated 342d ago
0.0(0)
flashcards
Geo5 Final
132
Updated 1219d ago
0.0(0)