Chapter 1 Flashcards
Cybersecurity Threats and Attacks
What is Denial of Service (DoS)?
A type of cyber attack that overwhelms a system, making it unavailable to users.
What is a BotNet?
A group of compromised computers (bots) connected to the internet and controlled remotely by a malicious actor.
What are On-Path Attacks (Man-in-the-Middle - MitM)?
An attacker intercepts and potentially modifies communications between two parties, such as a web browser and a web server.
What are Social Engineering Attacks?
Psychological manipulation techniques used to trick individuals into revealing confidential information or taking unsafe actions.
What is Phishing?
Deceptive emails or messages designed to steal sensitive data.
What are Watering Hole Attacks?
Attackers compromise websites frequently visited by their target group.
What are Business Email Compromise (BEC) Attacks?
Attackers impersonate executives to trick employees into financial transactions.
What is Physical Social Engineering?
Techniques involving physical interaction to manipulate individuals.
What is a Trojan Horse?
Malware disguised as legitimate software to gain user privileges and execute harmful actions.
What are Worms?
Self-replicating malware that exploits system vulnerabilities to spread across networks.
What is a Rootkit?
A type of malware that modifies system files and monitoring tools to remain undetected.
What is a Virus?
Malicious code that attaches itself to executable files and spreads by infecting other files.
What is Scareware?
Displays fake warnings about security risks to trick users into downloading malicious software.
What is Adware?
Delivers unwanted advertisements, often through web browsers.
What is a Backdoor?
A hidden way to bypass normal authentication and gain access to a system.
What is Spyware?
Monitors user activity, records keystrokes, and collects personal data.
What is Man-in-the-Mobile (MitMo)?
Targets mobile devices like phones and tablets to steal sensitive data.
What is Traffic Interception?
The process of capturing and potentially modifying network packets as they pass through a network.
What are Dictionary Attacks?
Using a list of common words to guess passwords.
What are Brute Force Attacks?
Trying all possible combinations of letters, numbers, and symbols.
What is an Exploit?
A program written to take advantage of a known vulnerability.
What are Race Conditions?
Flaws that occur when multiple processes access shared data simultaneously.
What are Weak Security Practices?
Includes outdated software, weak passwords, and inadequate access controls.
What is Access Control?
The process of managing who can access what resources and what they can do with them.