Domain 2 - Threats, Vulnerabilities, and Mitigations

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/173

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

174 Terms

1
New cards

Threat Actor

An individual or group responsible for a cybersecurity attack.

2
New cards

Nation-State Actor

Government-sponsored hackers with advanced resources and motives (espionage, disruption).

3
New cards

Hacktivist

A threat actor motivated by political or social causes.

4
New cards

Insider Threat

Malicious or careless employee/contractor who compromises systems.

5
New cards

Script Kiddie

Inexperienced attacker using pre-built tools/exploits.

6
New cards

Organized Crime

Groups motivated by financial gain, often running large cybercrime operations.

7
New cards

Attack Vector

Path or method used to launch an attack (e.g., phishing, removable media).

8
New cards

Attack Surface

All possible entry points into a system.

9
New cards

Zero-Day Exploit

Attack that occurs before a vulnerability is publicly known/fixed.

10
New cards

Advanced Persistent Threat (APT)

Long-term, targeted attack often sponsored by nation-states.

11
New cards

Shadow IT

Unauthorized use of IT resources or applications without organizational approval.

12
New cards

Social Engineering

Psychological manipulation to trick people into revealing information.

13
New cards

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access.

14
New cards

Virus

Malware that attaches to files/programs and requires user action to spread.

15
New cards

Worm

Self-replicating malware that spreads without user action.

16
New cards

Trojan Horse

Malware disguised as legitimate software.

17
New cards

Rootkit

Malware designed to hide presence and provide privileged access.

18
New cards

Spyware

Collects user activity/data without consent.

19
New cards

Adware

Displays unwanted ads, sometimes bundled with spyware.

20
New cards

Ransomware

Encrypts files or locks systems until ransom is paid.

21
New cards

Logic Bomb

Malicious code triggered by a condition or event.

22
New cards

Keylogger

Malware that records keystrokes.

23
New cards

Botnet

Network of infected machines under attacker's control.

24
New cards

Backdoor

Hidden method of bypassing normal authentication.

25
New cards

Phishing

Fraudulent attempt to obtain sensitive information via email/website.

26
New cards

Spear Phishing

Targeted phishing attack against a specific individual or group.

27
New cards

Whaling

Phishing attack targeting executives.

28
New cards

Vishing

Phishing conducted over phone calls.

29
New cards

Smishing

Phishing via SMS/text messages.

30
New cards

Pretexting

Fabricating a scenario to trick someone into providing data.

31
New cards

Baiting

Leaving infected media (e.g., USB drive) to tempt victims.

32
New cards

Business Email Compromise (BEC)

Fraudulent emails impersonating executives/vendors to trick employees.

33
New cards

Password Spraying

Trying common passwords against many accounts.

34
New cards

Credential Stuffing

Using stolen usernames/passwords from one site to access others.

35
New cards

Brute Force Attack

Trying all possible password combinations.

36
New cards

Dictionary Attack

Using predefined list of words to guess passwords.

37
New cards

Rainbow Table

Precomputed hashes used to crack passwords quickly.

38
New cards

Salting

Adding random data to passwords before hashing to prevent rainbow table attacks.

39
New cards

Secure Coding Practices

Guidelines to prevent software vulnerabilities.

40
New cards

Input Validation

Ensuring data entered into a program is safe.

41
New cards

SQL Injection (SQLi)

Inserting malicious SQL code into a query.

42
New cards

Cross-Site Scripting (XSS)

Injecting malicious scripts into web pages.

43
New cards

Cross-Site Request Forgery (CSRF)

Tricking a user into performing actions they didn't intend.

44
New cards

Directory Traversal

Exploiting improper file path validation to access restricted files.

45
New cards

Code Obfuscation

Making code difficult to read or reverse engineer.

46
New cards

Sandboxing

Running applications in isolated environments to limit damage.

47
New cards

Static Analysis

Reviewing code without execution.

48
New cards

Dynamic Analysis

Reviewing code during execution.

49
New cards

Fuzzing

Sending random or invalid data to software to find vulnerabilities.

50
New cards

Encryption

Converting plaintext into unreadable ciphertext using an algorithm and key.

51
New cards

Symmetric Encryption

Uses the same key for encryption and decryption.

52
New cards

Asymmetric Encryption

Uses a public/private key pair.

53
New cards

Hash Function

One-way cryptographic function producing a fixed-size output.

54
New cards

Digital Signature

Provides integrity and non-repudiation by signing data with a private key.

55
New cards

Public Key Infrastructure (PKI)

System for issuing, distributing, and managing digital certificates.

56
New cards

Certificate Authority (CA)

Trusted entity that issues and verifies digital certificates.

57
New cards

Registration Authority (RA)

Verifies identities before a CA issues certificates.

58
New cards

Certificate Revocation List (CRL)

List of certificates that have been revoked.

59
New cards

Online Certificate Status Protocol (OCSP)

Real-time check of certificate validity.

60
New cards

Key Escrow

Storing encryption keys securely with a third party.

61
New cards

Perfect Forward Secrecy (PFS)

Ensures session keys are not compromised if private key is exposed.

62
New cards

Elliptic Curve Cryptography (ECC)

Strong encryption with shorter keys, efficient for mobile devices.

63
New cards

Diffie-Hellman

Key exchange protocol for securely sharing symmetric keys.

64
New cards

Steganography

Hiding data inside other files (e.g., images, audio).

65
New cards

Identification

Claiming an identity (e.g., username).

66
New cards

Authentication

Proving an identity (e.g., password, biometrics).

67
New cards

Authorization

Granting access to resources based on privileges.

68
New cards

Accounting (AAA)

Logging and monitoring user activity.

69
New cards

Single Sign-On (SSO)

One login grants access to multiple systems.

70
New cards

Multifactor Authentication (MFA)

Using two or more authentication factors.

71
New cards

Federated Identity

Linking user identity across multiple organizations.

72
New cards

Role-Based Access Control (RBAC)

Permissions assigned based on job role.

73
New cards

Mandatory Access Control (MAC)

System-enforced access, usually based on classification labels.

74
New cards

Discretionary Access Control (DAC)

Owner controls who can access resources.

75
New cards

Attribute-Based Access Control (ABAC)

Access based on policies evaluating attributes.

76
New cards

Privileged Access Management (PAM)

Tools for controlling and auditing admin accounts.

77
New cards

Identity Provider (IdP)

Service that authenticates and provides identity information.

78
New cards

Access Recertification

Periodic review of user access rights.

79
New cards

Redundancy

Duplication of systems to increase availability.

80
New cards

High Availability (HA)

Ensuring systems remain accessible with minimal downtime.

81
New cards

Load Balancer

Distributes traffic across multiple servers.

82
New cards

Failover

Automatic switching to backup system when primary fails.

83
New cards

Hot Site

Fully equipped backup facility ready for immediate use.

84
New cards

Warm Site

Backup site with partial resources requiring setup.

85
New cards

Cold Site

Backup location with infrastructure but no equipment.

86
New cards

UPS (Uninterruptible Power Supply)

Provides temporary power during outages.

87
New cards

Generators

Provide long-term backup power.

88
New cards

Mantrap

Two-door system that only allows one person through at a time.

89
New cards

Bollards

Physical barriers to prevent vehicle access.

90
New cards

Faraday Cage

Blocks electromagnetic signals.

91
New cards

HVAC Controls

Maintain proper environmental conditions for IT systems.

92
New cards

Defense in Depth

Layered security controls for protection.

93
New cards

Infrastructure as a Service (IaaS)

Cloud model providing virtualized hardware resources.

94
New cards

Platform as a Service (PaaS)

Cloud model providing hardware + development tools.

95
New cards

Software as a Service (SaaS)

Cloud-delivered applications.

96
New cards

Public Cloud

Services offered to multiple customers via internet.

97
New cards

Private Cloud

Dedicated infrastructure for a single organization.

98
New cards

Hybrid Cloud

Combination of private and public clouds.

99
New cards

Community Cloud

Shared infrastructure for organizations with similar needs.

100
New cards

Virtual Machine (VM)

Emulation of a computer system.