INFORMATION ASSURANCE AND SECURITY

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

21 Terms

1
New cards

Bad Actors

• is a general term for entities (individuals, criminal enterprises,

nation states, etc.) who act to breach or use an IT system

counter to the desire of its operators.

• Their motivations include theft or stealth control of IT assets.

• Find many ways to trick people into telling their account names

and passwords directly.

2
New cards

Phishing

Set up a web server with a login page that looks

identical to the one want to break into then redirect their

browser to the real login page where they can login and think

that everything’s ok.

3
New cards

Hacktivist

They’re the ones motivated by political, social, or moral outrage

representing things they collectively don't agree with.

4
New cards

distributed denial of service attack

The guy who sends bogus network requests to their victims, to

attack what is known as a

5
New cards

Botnet

A command and control server accessible on the

internet, that through a malware installed on some

unsuspecting computers will wait patiently for instructions from

the command and control server. But a common method is to

put a software installer as an attachment to spam email

6
New cards

Cyber Terrorists

• A group not usually well-funded, but with a lot of ingenuity to

attack their enemy high profile targets, capable to disrupt

internet services with DDoS attacks, infiltrate systems to steal

sensitive data, or expose the personal data about people they

want harmed.

• They also threaten to corrupt critical information, hoping to

throw entire industries into disarray.

7
New cards

Spear phising

a simple technique where they send emails

only to specific target. Once they infected the computer of the

target, they can get to the more serious stuff

8
New cards

Cyber criminals

• Getting into a network and stealing the credit card data, they

can sell that info to any number of buyers. Or even use those

credit cards themselves.

• Once they're inside that network, they can also grab the

personal information about other customers.

9
New cards

Ransomware

This allows to extort money directly from the

owners of infected computers, holding their data for ransom.

Usually it means infecting a computer with software, that will

encrypt a computer's hard drive and display a message

demanding the payment of some amount of bitcoin in trade for

the encryption key to get their data back

10
New cards

Zero Day

is a software vulnerability discovered by

attackers before the vendor has become aware of it. Because

the vendors are unaware, no patch exists for zero-day

vulnerabilities, making attacks likely to succeed.

11
New cards

Data Privacy

relates to business policies that define appropriate

data management such as collection, retention, and deletion.

12
New cards

Cybersecurity

comprises methods for protecting networks,

devices, and data from unauthorized access, and ensuring the

confidentiality, integrity, and availability of all that information.

13
New cards

Vulnerabilities

are flaws in software, firmware, or hardware that an

attacker can exploit to perform unauthorized actions in a system.

14
New cards

Attackers

seek to exploit vulnerabilities in software and computer

systems for their own gain, and their actions are typically in violation of the

intended use of the system.

15
New cards

Attack surface

is any exposed place in your environment that a bad

actor can use to gain entry to, or extract something valuable, the places

that you want to protect. The goal of cybersecurity professionals to identify

all the attack surfaces, reduce their size, and decrease the risk of attack.

16
New cards

Malware

is an unwanted file or program that can cause harm to a

computer or compromise data stored on a computer. Examples of

malicious code classification include a virus, worm, botnet, Trojan horse,

DDOS, and ransomware

17
New cards

Personally idetifiable information

includes anything that can distinguish you, such as full name,

birthday, biometrics, passport, ID, credit card, phone numbers,

and home or email address.

18
New cards

Multifactor authentication

where the system requires at

least two separate elements to allow access.

19
New cards

Social Engineers

also called Threat Actors, try to influence

behavior, and human error accounts for nearly all data

(sensitive information) breaches

20
New cards

Juice Jacking

compromised public charging station that

installs malware when a portable device plugs in from public

areas, such as an airport, train station, or conference arena.

21
New cards

Insider threat

can be harmful to an organization, its data,

and its brand reputation. Both current and former employees

possess valuable knowledge about a company, and are

capable of committing crimes that may cause severe harm to

the organization.