Chapter 10 vocab Flashcards
Tricking a victim into revealing sensitive information under false pretenses.
Pretexting
Exploiting a victim using email messages.
Email Attack
Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
Browser Attack
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Man-in-the-Middle Attack
An attempt to connect to a server by capturing and resending authentication information.
Replay Attack
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
Denial of Service
Software designed to infiltrate or damage a computer system without the owner’s consent or knowledge.
Malware
An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
Password Attack
A type of authentication that requires the user to provide something that they know, such as a password or PIN.
Type 1 Authentication
A type of authentication that requires the user to provide something that they have, such as a key fob, electronic chip, or smart card.
Type 2 Authentication
A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.
Type 3 Authentication
Authentication that requires two or more evidences of authentication, usually of different types.
Multifactor Authentication
A method of authenticating with one system to gain access to other related systems.
Single Sign-on
A type of access control where a user has complete control over a resource, and also determines the permissions other users have to those resources.
Discretionary Access Control (DAC)
A type of access control that restricts access based on the user’s role in an organization.
Role-based Access Control (RBAC)