C5 M4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Angler phishing

A technique where attackers impersonate customer service representatives on social media

2
New cards

Advanced persistent threat (APT)

Instances when a threat actor maintains unauthorized access to a system for an extended period of time 

3
New cards

Adware

A type of legitimate software that is sometimes used to display digital advertisements in applications

4
New cards

Attack tree

A diagram that maps threats to assets

5
New cards

Baiting

A social engineering tactic that tempts people into compromising their security

6
New cards

Botnet

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"

7
New cards

Cross-site scripting (XSS)

An injection attack that inserts code into a vulnerable website or web application

8
New cards

Cryptojacking

A form of malware that installs software to illegally mine cryptocurrencies 

9
New cards

DOM-based XSS attack

An instance when malicious script exists in the webpage a browser loads

10
New cards

Dropper

A type of malware that comes packed with malicious code which is delivered and installed onto a target system

11
New cards

Fileless malware

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer

12
New cards

Hacker

Any person or group who uses computers to gain unauthorized access to data

13
New cards

Identity and access management (IAM)

A collection of processes and technologies that helps organizations manage digital identities in their environment 

14
New cards

Injection attack

Malicious code inserted into a vulnerable application

15
New cards

Input validation

Programming that validates inputs from users and other programs

16
New cards

Intrusion detection system (IDS)

An application that monitors system activity and alerts on possible intrusions

17
New cards

Loader

A type of malware that downloads strains of malicious code from an external source and installs them onto a target system

18
New cards

Malware

Software designed to harm devices or networks

19
New cards

Process of Attack Simulation and Threat Analysis (PASTA)

A popular threat modeling framework that’s used across many industries

20
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

21
New cards

Phishing kit

A collection of software tools needed to launch a phishing campaign

22
New cards

Prepared statement

A coding technique that executes SQL statements before passing them onto the database 

23
New cards

Potentially unwanted application (PUA)

A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software

24
New cards

Quid pro quo

A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money

25
New cards

Ransomware

Type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access

26
New cards

Reflected XSS attack

An instance when malicious script is sent to a server and activated during the server’s response 

27
New cards

Rootkit

Malware that provides remote, administrative access to a computer

28
New cards

Scareware

Malware that employs tactics to frighten users into infecting their device

29
New cards

Smishing

The use of text messages to trick users to obtain sensitive information or to impersonate a known source

30
New cards

Social engineering

A manipulation technique that exploits human error to gain private information, access, or valuables

31
New cards

Spear phishing

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

32
New cards

Spyware

Malware that’s used to gather and sell information without consent

33
New cards

SQL (Structured Query Language)

A programming language used to create, interact with, and request information from a database

34
New cards

SQL injection

An attack that executes unexpected queries on a database

35
New cards

Stored XSS attack

An instance when malicious script is injected directly on the server

36
New cards

Tailgating

A social engineering tactic in which unauthorized people follow an authorized person into a restricted area

37
New cards

Threat modeling

The process of identifying assets, their vulnerabilities, and how each is exposed to threats

38
New cards

Watering hole attack:

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

39
New cards

Whaling

A category of spear phishing attempts that are aimed at high-ranking executives in an organization