1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Bad Actors
• is a general term for entities (individuals, criminal enterprises,
nation states, etc.) who act to breach or use an IT system
counter to the desire of its operators.
• Their motivations include theft or stealth control of IT assets.
• Find many ways to trick people into telling their account names
and passwords directly.
Phishing
Set up a web server with a login page that looks
identical to the one want to break into then redirect their
browser to the real login page where they can login and think
that everything’s ok.
Hacktivist
They’re the ones motivated by political, social, or moral outrage
representing things they collectively don't agree with.
distributed denial of service attack
The guy who sends bogus network requests to their victims, to
attack what is known as a
Botnet
A command and control server accessible on the
internet, that through a malware installed on some
unsuspecting computers will wait patiently for instructions from
the command and control server. But a common method is to
put a software installer as an attachment to spam email
Cyber Terrorists
• A group not usually well-funded, but with a lot of ingenuity to
attack their enemy high profile targets, capable to disrupt
internet services with DDoS attacks, infiltrate systems to steal
sensitive data, or expose the personal data about people they
want harmed.
• They also threaten to corrupt critical information, hoping to
throw entire industries into disarray.
Spear phising
a simple technique where they send emails
only to specific target. Once they infected the computer of the
target, they can get to the more serious stuff
Cyber criminals
• Getting into a network and stealing the credit card data, they
can sell that info to any number of buyers. Or even use those
credit cards themselves.
• Once they're inside that network, they can also grab the
personal information about other customers.
Ransomware
This allows to extort money directly from the
owners of infected computers, holding their data for ransom.
Usually it means infecting a computer with software, that will
encrypt a computer's hard drive and display a message
demanding the payment of some amount of bitcoin in trade for
the encryption key to get their data back
Zero Day
is a software vulnerability discovered by
attackers before the vendor has become aware of it. Because
the vendors are unaware, no patch exists for zero-day
vulnerabilities, making attacks likely to succeed.
Data Privacy
relates to business policies that define appropriate
data management such as collection, retention, and deletion.
Cybersecurity
comprises methods for protecting networks,
devices, and data from unauthorized access, and ensuring the
confidentiality, integrity, and availability of all that information.
Vulnerabilities
are flaws in software, firmware, or hardware that an
attacker can exploit to perform unauthorized actions in a system.
Attackers
seek to exploit vulnerabilities in software and computer
systems for their own gain, and their actions are typically in violation of the
intended use of the system.
Attack surface
is any exposed place in your environment that a bad
actor can use to gain entry to, or extract something valuable, the places
that you want to protect. The goal of cybersecurity professionals to identify
all the attack surfaces, reduce their size, and decrease the risk of attack.
Malware
is an unwanted file or program that can cause harm to a
computer or compromise data stored on a computer. Examples of
malicious code classification include a virus, worm, botnet, Trojan horse,
DDOS, and ransomware
Personally idetifiable information
includes anything that can distinguish you, such as full name,
birthday, biometrics, passport, ID, credit card, phone numbers,
and home or email address.
Multifactor authentication
where the system requires at
least two separate elements to allow access.
Social Engineers
also called Threat Actors, try to influence
behavior, and human error accounts for nearly all data
(sensitive information) breaches
Juice Jacking
compromised public charging station that
installs malware when a portable device plugs in from public
areas, such as an airport, train station, or conference arena.
Insider threat
can be harmful to an organization, its data,
and its brand reputation. Both current and former employees
possess valuable knowledge about a company, and are
capable of committing crimes that may cause severe harm to
the organization.