1/18
These flashcards cover key vocabulary and concepts related to threats and attacks in secure electronic commerce.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
DDoS
Distributed Denial of Service; an attack that involves multiple compromised devices overwhelming a target system.
Botnet
A collection of compromised computers controlled by an attacker, typically used to launch DDoS attacks.
SQL Injection
A code injection technique that exploits a security vulnerability in an application's software by manipulating SQL queries.
Cross-Site Scripting (XSS)
A security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites.
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information.
Buffer Overflow
A situation where a program writes more data to a block of memory, or buffer, than it was allocated for.
Threat Components
Elements that dictate how threats manifest, including threat agents, capabilities, inhibitors, amplifiers, and catalysts.
Threat Agents
Individuals or groups that actively seek to exploit vulnerabilities for malicious intents.
Natural Threats
Threats from environmental events such as fires or floods.
Human Threats
Threats originating from human actions, which can be benign, malicious, or non-hostile.
Reconnaissance
The initial step in a successful attack where attackers discover key elements of a network or system.
Modification
A form of attack where an unauthorized party changes an asset without permission.
Exfiltration
The act of stealing files or data from a system during a cyber attack.
Denial of Service (DoS) Attack
An interruption or degradation of service availability to legitimate users.
Anger (Retaliatory) Motivation
A criminal motivation arising from rage, aimed at correcting perceived injustices.
Sadistic Motivation
Deriving pleasure from the pain or suffering inflicted on others.
Profit-oriented Motivation
The drive to commit cyber crimes for material or personal gain.
Network Layer Attack
DDoS attacks that target network infrastructure using high traffic volume typically at Layer 3/4.
Application Layer Attack
DDoS attacks that target specific applications, often appearing legitimate, at Layer 7.