Cyber Security

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Cyber security

Practice of protecting systems, networks, and programs from digital attacks to ensure confidentiality, integrity, and availability of data.

2
New cards

Malware

Malicious software disrupting, damaging, or gaining unauthorized access to computer systems. Types include viruses, worms, trojans, spyware, and adware.

3
New cards

Phishing

Fraudulent attempts to obtain sensitive information by posing as a trustworthy entity in electronic communications. Types include email phishing, spear phishing, smishing, and vishing.

4
New cards

Ransomware

Type of malware encrypting victim's files and demanding payment for decryption key. Examples include WannaCry, CryptoLocker, and NotPetya.

5
New cards

Insider Threats

Security risks from within the organization, involving malicious insiders, negligent insiders, and compromised insiders.

6
New cards

Vulnerabilities

Weaknesses in a system that can be exploited by threats, such as software bugs like buffer overflows, code injection, privilege escalation, weak passwords, and unpatched software.

7
New cards

Buffer Overflows

Errors occurring when a program writes more data to a buffer than it can hold, potentially allowing execution of arbitrary code.

8
New cards

Code Injection

Flaws enabling attackers to inject malicious code into a program, often through input fields.

9
New cards

Privilege Escalation

Vulnerabilities allowing attackers to gain elevated access to resources that are normally protected.

10
New cards

Weak Passwords

Easily guessable passwords providing an easy entry point for attackers due to common words or phrases, short length, and lack of complexity.

11
New cards

Unpatched Software

Outdated software lacking the latest security patches, making it vulnerable to attacks by exploiting known vulnerabilities.

12
New cards

Types of Cyber Attacks

Include malware (viruses, worms, trojans, spyware), which disrupt, damage, or gain unauthorized access to computer systems.

13
New cards

Viruses

Attach to legitimate programs or files, spread between computers, and can cause damage by deleting files, corrupting data, or slowing down system performance.

14
New cards

Worms

Self-replicating malware spreading without user intervention, exploiting network vulnerabilities to infect systems and cause disruption.

15
New cards

Trojans

Disguised as legitimate software but contain malicious code to create backdoors, steal information, or install additional malware.

16
New cards

Spyware

Secretly monitors and collects user information, tracking online activities, capturing keystrokes, and harvesting personal data for identity theft or espionage.

17
New cards

Adware

Automatically displays or downloads advertising material. Can track user behavior to deliver targeted ads. Can degrade system performance and invade privacy.