knowt logo

Adv Cybersec Unit 1

Layered Security: Security approach that combines multiple security controls and defenses to create a cumulative effect

Bottom Layer of LS Model: Policies, procedures, awareness

Top Layer of LS Model: Data

Credential Harvesting - Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)

Trojan Horse - Malware that downloads onto a computer disguised as a legitimate program

Worm - Malware or malicious software that can replicate rapidly and spread across devices in a network

Virus - Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software

RAT (Remote Access Trojan) - Malware designed to allow an attacker to remotely control an infected computer

Root kit - Set of software tools that enables an unauthorized user to gain control of a computer system without being detected

Spyware - Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive

Bots - A software application programmed to execute specific tasks as part of another computer program or to simulate human activity

Botnets - A network of computers infected by malware that are under the control of a single attacking party

Logic Bombs - A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer

Password attack - When a hacker tries to steal your password

Physical attack - Security breach that impacts operations, damages property, or impacts physical environment

Cloud-based attack - Cyber attack that targets cloud-based service platforms

On-premise attack - Security threats that target on-premise systems and services, such as local servers and desktop computers

A

Adv Cybersec Unit 1

Layered Security: Security approach that combines multiple security controls and defenses to create a cumulative effect

Bottom Layer of LS Model: Policies, procedures, awareness

Top Layer of LS Model: Data

Credential Harvesting - Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)

Trojan Horse - Malware that downloads onto a computer disguised as a legitimate program

Worm - Malware or malicious software that can replicate rapidly and spread across devices in a network

Virus - Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software

RAT (Remote Access Trojan) - Malware designed to allow an attacker to remotely control an infected computer

Root kit - Set of software tools that enables an unauthorized user to gain control of a computer system without being detected

Spyware - Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive

Bots - A software application programmed to execute specific tasks as part of another computer program or to simulate human activity

Botnets - A network of computers infected by malware that are under the control of a single attacking party

Logic Bombs - A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer

Password attack - When a hacker tries to steal your password

Physical attack - Security breach that impacts operations, damages property, or impacts physical environment

Cloud-based attack - Cyber attack that targets cloud-based service platforms

On-premise attack - Security threats that target on-premise systems and services, such as local servers and desktop computers