Cyber Security

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Cyber security

1 / 16

flashcard set

Earn XP

Description and Tags

17 Terms

1

Cyber security

Practice of protecting systems, networks, and programs from digital attacks to ensure confidentiality, integrity, and availability of data.

New cards
2

Malware

Malicious software disrupting, damaging, or gaining unauthorized access to computer systems. Types include viruses, worms, trojans, spyware, and adware.

New cards
3

Phishing

Fraudulent attempts to obtain sensitive information by posing as a trustworthy entity in electronic communications. Types include email phishing, spear phishing, smishing, and vishing.

New cards
4

Ransomware

Type of malware encrypting victim's files and demanding payment for decryption key. Examples include WannaCry, CryptoLocker, and NotPetya.

New cards
5

Insider Threats

Security risks from within the organization, involving malicious insiders, negligent insiders, and compromised insiders.

New cards
6

Vulnerabilities

Weaknesses in a system that can be exploited by threats, such as software bugs like buffer overflows, code injection, privilege escalation, weak passwords, and unpatched software.

New cards
7

Buffer Overflows

Errors occurring when a program writes more data to a buffer than it can hold, potentially allowing execution of arbitrary code.

New cards
8

Code Injection

Flaws enabling attackers to inject malicious code into a program, often through input fields.

New cards
9

Privilege Escalation

Vulnerabilities allowing attackers to gain elevated access to resources that are normally protected.

New cards
10

Weak Passwords

Easily guessable passwords providing an easy entry point for attackers due to common words or phrases, short length, and lack of complexity.

New cards
11

Unpatched Software

Outdated software lacking the latest security patches, making it vulnerable to attacks by exploiting known vulnerabilities.

New cards
12

Types of Cyber Attacks

Include malware (viruses, worms, trojans, spyware), which disrupt, damage, or gain unauthorized access to computer systems.

New cards
13

Viruses

Attach to legitimate programs or files, spread between computers, and can cause damage by deleting files, corrupting data, or slowing down system performance.

New cards
14

Worms

Self-replicating malware spreading without user intervention, exploiting network vulnerabilities to infect systems and cause disruption.

New cards
15

Trojans

Disguised as legitimate software but contain malicious code to create backdoors, steal information, or install additional malware.

New cards
16

Spyware

Secretly monitors and collects user information, tracking online activities, capturing keystrokes, and harvesting personal data for identity theft or espionage.

New cards
17

Adware

Automatically displays or downloads advertising material. Can track user behavior to deliver targeted ads. Can degrade system performance and invade privacy.

New cards

Explore top notes

note Note
studied byStudied by 1013 people
... ago
5.0(5)
note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 352 people
... ago
5.0(2)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 1200 people
... ago
4.5(2)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 32 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (103)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (84)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 17 people
... ago
4.0(1)
flashcards Flashcard (28)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (673)
studied byStudied by 34 people
... ago
5.0(1)
flashcards Flashcard (73)
studied byStudied by 40 people
... ago
5.0(2)
flashcards Flashcard (64)
studied byStudied by 56 people
... ago
5.0(2)
flashcards Flashcard (50)
studied byStudied by 1 person
... ago
5.0(2)
robot