Cybersecurity Key Concepts: CIA Triad, Attacks, Malware, and Defense Strategies

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/170

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

171 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, Availability - Foundational security model ensuring data is private, accurate, and accessible when needed.

2
New cards

AAA

Authentication, Authorization, Accounting - Framework for controlling access, verifying identity, granting permissions, and tracking user actions.

3
New cards

MFA

Multi-Factor Authentication - Security method requiring two or more verification factors (something you know, have, or are).

4
New cards

Rainbow Table

Precomputed table used to crack password hashes by mapping hashes to plaintext passwords, bypassing salting if not used.

5
New cards

Brute Force Attack

Attempt to gain access by systematically trying all possible password combinations until the correct one is found.

6
New cards

Dictionary Attack

Password attack using a list of common words or phrases instead of random combinations.

7
New cards

Offline Attack

Attacking password hashes stored locally, without interacting with the authentication system.

8
New cards

Online Attack

Attempting to log in by guessing passwords through a live authentication interface.

9
New cards

Password Hashing

Converting a password into a fixed-length string using a one-way function to protect stored passwords.

10
New cards

Salt

Random data added to a password before hashing to prevent rainbow table attacks.

11
New cards

Stuxnet

A sophisticated worm discovered in 2010, designed to target Iran's nuclear facilities by sabotaging industrial control systems.

12
New cards

Biometrics

Authentication using unique biological traits (fingerprint, face, iris).

13
New cards

Social Engineering

Manipulating people into divulging confidential information or performing actions that compromise security.

14
New cards

Phishing

Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

15
New cards

Spear Phishing

Targeted phishing attack aimed at a specific individual or organization.

16
New cards

Whaling

Phishing attack targeting high-profile individuals like executives.

17
New cards

Vishing

Voice phishing - Using phone calls to trick people into revealing information.

18
New cards

Smishing

SMS phishing - Phishing via text messages.

19
New cards

Typosquatting

Registering domains with common misspellings of legitimate websites to capture traffic or conduct phishing.

20
New cards

Watering Hole Attack

Compromising a website frequented by a target group to infect their devices with malware.

21
New cards

Credential Harvesting

Collecting usernames and passwords through phishing, keyloggers, or data breaches.

22
New cards

Influence Campaign

Coordinated effort to manipulate public opinion, often using misinformation.

23
New cards

Insider Threat

Security risk originating from within the organization (employees, contractors).

24
New cards

Hoax

Deliberate fabrication intended to deceive, often spread via email or social media.

25
New cards

Malware

Malicious Software - Any software intentionally designed to cause damage to a computer, server, or network.

26
New cards

Ransomware

Malware that encrypts files and demands payment for decryption.

27
New cards

Trojans

Malware disguised as legitimate software, often creating backdoors.

28
New cards

Backdoor

Hidden method for bypassing authentication to gain unauthorized access.

29
New cards

RAT

Remote Access Trojan - Malware that allows unauthorized remote control of a system.

30
New cards

Virus

Malware that attaches itself to a legitimate program and spreads when the program runs.

31
New cards

Worm

Self-replicating malware that spreads across networks without user interaction.

32
New cards

Spyware

Malware that secretly monitors user activity and collects data.

33
New cards

Adware

Unwanted software that displays advertisements, often bundled with free software.

34
New cards

Keylogger

Hardware or software that records keystrokes to capture sensitive information like passwords.

35
New cards

Logic Bomb

Malicious code that executes when specific conditions are met (e.g., date, system event).

36
New cards

Rootkit

Stealthy malware designed to hide the existence of certain processes or programs from detection.

37
New cards

DoS / DDoS

Denial of Service / Distributed Denial of Service - Attacks aimed at making a system unavailable by overwhelming it with traffic.

38
New cards

Botnet

Network of infected devices controlled by an attacker, often used for DDoS.

39
New cards

DNS Attack

Exploiting vulnerabilities in the Domain Name System to redirect traffic or intercept data.

40
New cards

DNS Spoofing

Corrupting DNS cache to redirect users to malicious sites.

41
New cards

Wireless Attack

Exploiting weaknesses in wireless networks (e.g., weak encryption, rogue access points).

42
New cards

On-Path Attack (MitM)

Attacker secretly intercepts and relays messages between two parties who believe they are communicating directly.

43
New cards

Replay Attack

Capturing and resending a valid transmission (like a session token) to gain unauthorized access.

44
New cards

Endpoint Security

Protecting end-user devices like laptops, phones, and tablets from threats.

45
New cards

Protocol Security

Securing communication protocols (e.g., HTTPS, SSH, WPA3).

46
New cards

Email Security

Protecting email from phishing, spam, malware, and spoofing.

47
New cards

Application Vulnerability

Weakness in software that can be exploited (e.g., SQL injection, XSS).

48
New cards

Session Replay Attack

Capturing and resending a valid session token to gain unauthorized access.

49
New cards

Directory Traversal

Exploiting insufficient security validation to access files and directories outside the web root folder.

50
New cards

Privilege Escalation

Gaining higher-level permissions than intended, often through exploiting vulnerabilities.

51
New cards

Pass the Hash

Using a captured password hash to authenticate without needing the plaintext password.

52
New cards

Buffer Overflow

Writing more data to a buffer than it can hold, causing memory corruption and potential code execution.

53
New cards

Command Injection

Injecting malicious commands into a system through vulnerable input fields.

54
New cards

CSRF

Cross-Site Request Forgery - Tricking a user into executing unwanted actions on a web app where they're authenticated.

55
New cards

SQL Injection

Inserting malicious SQL code into input fields to manipulate a database.

56
New cards

XSS

Cross-Site Scripting - Injecting malicious scripts into web pages viewed by other users.

57
New cards

OS Vulnerabilities

Weaknesses in operating systems (e.g., Windows, Linux) that can be exploited.

58
New cards

Web-based Vulnerabilities

Security flaws in web applications or services (e.g., CMS, APIs).

59
New cards

Hardware Vulnerabilities

Flaws in physical devices (e.g., CPUs, routers, IoT devices).

60
New cards

Virtualization Vulnerabilities

Weaknesses in virtual machines or hypervisors (e.g., VENOM).

61
New cards

Supply Chain Attack

Compromising a system by targeting less-secure elements in the supply chain (e.g., software updates, hardware).

62
New cards

Zero-Day Vulnerability

A security flaw unknown to the vendor, with no patch available, often exploited before discovery.

63
New cards

Cryptographic Vulnerability

Weakness in encryption algorithms or implementation (e.g., weak keys, outdated protocols).

64
New cards

Mobile Security

Protecting smartphones and tablets from malware, data leakage, and network attacks.

65
New cards

Physical Attack

Gaining access through physical means (e.g., theft, tampering, shoulder surfing).

66
New cards

Physical Security

Measures to protect hardware, facilities, and personnel (e.g., locks, cameras, access logs).

67
New cards

VENOM Vulnerability

Virtualized Environment Neglected Operations Manipulation - A flaw in virtual floppy disk code allowing escape from a VM to the host.

68
New cards

Heartbleed

Critical vulnerability in OpenSSL (2014) allowing attackers to read memory of systems protected by SSL/TLS.

69
New cards

Race Condition

Flaw where output depends on sequence/timing of uncontrollable events, leading to security issues.

70
New cards

Integer Overflow

When an arithmetic operation exceeds the maximum value a variable can hold, causing unexpected behavior.

71
New cards

Geolocation Data

Information about the physical location of a device, which can be leaked or exploited.

72
New cards

Wireless Disassociation Attack

Sending deauthentication frames to disconnect users from a Wi-Fi network.

73
New cards

Chrome Crash Catastrophe

Example of a vulnerability causing browser crashes, potentially leading to exploitation.

74
New cards

iPhone Integer Overflow

Case study of an integer overflow vulnerability in iOS leading to security bypass.

75
New cards

FBI Response to REvil Ransomware

Example of law enforcement action against ransomware operators.

76
New cards

TeaBot Malware

Android malware stealing banking credentials and SMS messages, spreading globally.

77
New cards

Salesforce Phishing Case

Example of phishing targeting CRM users to steal credentials.

78
New cards

Influence Campaign Case

Example of misinformation used to manipulate public perception.

79
New cards

cd (Linux)

Change directory - navigates to a specified folder.

80
New cards

ls

List files and directories in the current folder.

81
New cards

pwd

Print working directory - shows current path.

82
New cards

touch

Creates a new empty file.

83
New cards

mkdir

Creates a new directory.

84
New cards

rm

Removes files or directories.

85
New cards

cp

Copies files or directories.

86
New cards

mv

Moves or renames files/directories.

87
New cards

cat

Displays file contents.

88
New cards

man

Displays manual for a command.

89
New cards

grep

Searches text using patterns.

90
New cards

sort

Sorts lines of text files.

91
New cards

sudo

Runs a command with superuser privileges.

92
New cards

cd (Windows)

Change directory.

93
New cards

dir

List files and directories.

94
New cards

copy

Copies files.

95
New cards

del

Deletes files.

96
New cards

type

Displays file contents.

97
New cards

Relative Path

Path relative to current directory (e.g., ./docs/file.txt).

98
New cards

Absolute Path

Full path from root (e.g., /home/user/docs/file.txt).

99
New cards

Redirecting Output (>)

Sends command output to a file (overwrites).

100
New cards

Appending Output (>>)

Appends command output to a file.