Security+ Threats, Vulnerabilities & Mitigation section:

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:28 PM on 5/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

85 Terms

1
New cards

Phishing

A social engineering attack where criminals impersonate a trusted organization

2
New cards

Spear Phishing

A targeted phishing attack directed at a specific individual or organization using personalized information

3
New cards

Vishing

A phishing attack conducted over voice calls to trick victims into revealing sensitive information

4
New cards

Smishing

A phishing attack conducted via SMS/text messages

5
New cards

Whaling

A spear phishing attack specifically targeting high-level executives or privileged users

6
New cards

Watering hole attack

An attacker poisons a third party website/software that a company uses

7
New cards

Business Email Compromise (BEC)

An attacker impersonates a trusted business contact via email to authorize fraudulent transactions

8
New cards

Pretexting

Creating a fabricated scenario to manipulate a victim into providing information or access

9
New cards

Tailgating

Physically following an authorized person into a restricted area without their knowledge

10
New cards

Shoulder surfing

Observing someone's screen or keyboard to steal credentials or sensitive data

11
New cards

Memory injection

Malware injects itself directly into a known process running in memory

12
New cards

DLL (Dynamic Link Library)

A Windows library containing code and data

13
New cards

DLL injection

Malware forces a legitimate process to load a malicious DLL into memory

14
New cards

Buffer overflow

Overwriting a buffer of memory to execute arbitrary code

15
New cards

Integer overflow

An arithmetic operation produces a value too large for the data type, causing unexpected behavior that can be exploited

16
New cards

Race conditions

Abusing the time that two programs are running at the same time and exploiting the interactions between them

17
New cards

TOCTOU (Time-of-Check to Time-of-Use)

When a system checks the state of a resource but the resource changes before it is used, allowing an attacker to manipulate the outcome

18
New cards

SQL injection

A crafted statement that retrieves or manipulates unauthorized information from a SQL database

19
New cards

XSS (Cross-Site Scripting)

A web security vulnerability where an attacker injects malicious scripts into a trusted website

20
New cards

Stored XSS

Malicious script is permanently saved on the target server and served to all users who visit the page

21
New cards

Reflected XSS

Malicious script is embedded in a URL and executed immediately when the victim clicks it

22
New cards

CSRF (Cross-Site Request Forgery)

Tricks an authenticated user's browser into sending unauthorized requests to a web application

23
New cards

Directory traversal

An attacker navigates outside the intended directory using ../ sequences to access restricted files

24
New cards

XML injection

An attacker inserts malicious XML content to manipulate an application's processing or database

25
New cards

LDAP injection

An attacker manipulates LDAP queries to bypass authentication or retrieve unauthorized directory data

26
New cards

Command injection

An attacker injects operating system commands into an application input field to execute them on the server

27
New cards

EOL (End of Life)

Manufacturer stops selling a product but still offers support

28
New cards

EOSL (End of Service Life)

Manufacturer stops selling a product and no longer offers any support

29
New cards

Legacy system

An outdated system still in use that may no longer receive patches or security updates

30
New cards

DoS (Denial of Service)

An attack that overwhelms a system or service to make it unavailable to legitimate users

31
New cards

DDoS (Distributed Denial of Service)

A large army of compromised computers attempting to take down a service or services

32
New cards

Amplification attack

An attacker spoofs a victim's IP and sends small requests to servers that reply with much larger responses, overwhelming the victim

33
New cards

SYN flood

An attacker sends many SYN packets without completing the TCP handshake, exhausting server connection resources

34
New cards

Zero-day

A vulnerability that the developer is unaware of and has no patch available

35
New cards

Virus

Malware that reproduces itself by attaching to files or spreading through a network

36
New cards

Worm

Malware that is self-contained and spreads automatically without user interaction

37
New cards

Trojan

Malware disguised as legitimate software that creates a backdoor when executed

38
New cards

Ransomware

Malware that encrypts a victim's data and demands payment for the decryption key

39
New cards

Spyware

Malware that secretly monitors user activity and transmits data to an attacker

40
New cards

Adware

Software that automatically displays unwanted advertisements and may track browsing behavior

41
New cards

Keylogger

Records keystrokes to capture credentials and sensitive information

42
New cards

Rootkit

Modifies internal system files to hide malware and maintain persistent privileged access

43
New cards

Backdoor

A hidden method of bypassing normal authentication to maintain remote access to a system

44
New cards

Botnet

A network of compromised machines controlled by an attacker to carry out coordinated attacks

45
New cards

Command and Control (C2)

The infrastructure an attacker uses to communicate with and control compromised systems

46
New cards

Fileless malware

Malware that runs entirely in memory without writing files to disk, evading traditional antivirus detection

47
New cards

RFID cloning

Duplicating RFID signals to copy ID badges or access cards

48
New cards

Bluetooth attack (Bluejacking/Bluesnarfing)

Bluejacking sends unsolicited messages

49
New cards

Evil twin

A rogue wireless access point that mimics a legitimate one to intercept traffic

50
New cards

DNS attack

Modifying the DNS server to redirect users to a malicious server

51
New cards

DNS poisoning (Cache poisoning)

Corrupting a DNS resolver's cache to redirect users to fraudulent sites without their knowledge

52
New cards

Domain hijacking

Gaining full control over a domain's registration to redirect or take over its traffic

53
New cards

Typosquatting

Registering a domain name similar to a legitimate one to capture traffic from users who mistype the URL

54
New cards

Wireless deauthentication

Sending forged deauth frames to forcibly disconnect a device from a wireless network

55
New cards

802.1X

A network access control protocol that authenticates devices before allowing them onto a network

56
New cards

On-path attack (Man-in-the-Middle)

Redirects traffic through the attacker who reads or alters it before passing it to the destination

57
New cards

Replay attack

Capturing valid data transmitted between a client and server and retransmitting it to gain unauthorized access

58
New cards

SSL stripping

Downgrades an HTTPS connection to HTTP so an on-path attacker can read plaintext traffic

59
New cards

Out-of-cycle patching

Releasing a security patch outside the normal patch schedule in response to a critical vulnerability

60
New cards

FDE (Full Disk Encryption)

Encrypts all data on a drive so it cannot be read without the correct credentials

61
New cards

EDR (Endpoint Detection and Response)

Security solution that continuously monitors endpoints to detect and respond to threats

62
New cards

HIPS (Host-based Intrusion Prevention System)

Monitors and blocks malicious activity on an individual host

63
New cards

NIDS (Network Intrusion Detection System)

Monitors network traffic for suspicious activity and alerts administrators

64
New cards

NIPS (Network Intrusion Prevention System)

Monitors network traffic and actively blocks detected threats

65
New cards

Vulnerability scan

An automated tool that identifies known vulnerabilities in systems without exploiting them

66
New cards

Penetration testing

Authorized simulated attack on a system to identify and exploit vulnerabilities before attackers do

67
New cards

Threat intelligence

Collected information about current and emerging threats used to inform security decisions

68
New cards

IOC (Indicator of Compromise)

Evidence such as file hashes, IPs, or domain names that suggest a system has been breached

69
New cards

SIEM (Security Information and Event Management)

Aggregates and correlates log data from multiple sources to detect and alert on security events

70
New cards

Data exfiltration

Unauthorized transfer of data from an organization to an external destination controlled by an attacker

71
New cards

Credential stuffing

Using large lists of stolen username/password pairs to attempt logins across many services

72
New cards

Password spraying

Attempting a small number of common passwords against many accounts to avoid lockout thresholds

73
New cards

Brute force attack

Systematically trying every possible password combination until the correct one is found

74
New cards

Dictionary attack

Using a list of common words and passwords to attempt to crack credentials

75
New cards

Rainbow table attack

Using precomputed hash-to-password tables to reverse password hashes

76
New cards

Salting

Adding a random value to a password before hashing to defeat rainbow table attacks

77
New cards

MFA (Multi-Factor Authentication)

Requiring two or more verification factors to authenticate a user

78
New cards

Principle of least privilege

Users and systems are granted only the minimum access rights needed to perform their function

79
New cards

Patch management

The process of regularly applying updates to software and systems to remediate known vulnerabilities

80
New cards

Attack vector

The path or method an attacker uses to gain unauthorized access to a system

81
New cards

Attack surface

The total number of entry points an attacker can use to try to access a system

82
New cards

Threat actor

Any individual or group that carries out or sponsors malicious cyber activity

83
New cards

APT (Advanced Persistent Threat)

A sophisticated, long-term attack by a well-resourced threat actor targeting a specific organization

84
New cards

Insider threat

A security risk that originates from within the organization such as an employee or contractor

85
New cards

Supply chain attack

Compromising a trusted vendor or software update to gain access to downstream targe