Chapter 2: Threats, Vulnerabilities and Mitigations Flashcards
Logic Bomb
a string of malicious code intentionally inserted into a program to cause harm to a network when it meets certain conditions.
Trojan Horse
a type of malware that disguises itself as a legitimate program to trick users into downloading and installing it on their computer.
Rootkit
a type of malware that gives cybercriminals unauthorized access to a computer or network.
Worm
a type of malicious software (malware) that can self-replicate and spread rapidly across a network without any user interaction
WPA3
- Wi‐Fi Protected Access 3 (WPA‐3) is the most modern, most secure option
- Uses Simultaneous Authentication of Equals (SAE) instead of WPA2’s Pre-Shared Key (PSK). SAE is more secure and protects against offline dictionary attacks and password guessing attacks.
- encrypts each device’s data individually, which improves privacy and security.
https://www.securew2.com/wp-content/uploads/2023/08/Design-the-WPA2-Vs-802.1-X-Image.png
WPA2
- WPA2 is vulnerable to WEP attacks if the router is compatible with WEP systems.
- uses the Advanced Encryption Standard (AES), which is considered one of the most complex encryption technologies available. AES is used by the US government to protect classified data.
https://www.securew2.com/wp-content/uploads/2023/08/Design-the-WPA2-Vs-802.1-X-Image.png
Cross-site Scripting
Cross‐site scripting (XSS) involves entering a script into text areas that other users will view.
SQL Injection
a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed
On-path attack
a cyberattack where an attacker secretly intercepts and modifies communication between two parties.
What is a motivation for a Nation-state actor?
Nation‐state actors are typically advanced persistent threats (APTs) and their motivations commonly include espionage, data exfiltration, disruption/chaos, and war. Financial gain is more commonly associated with organized crime, blackmail with insider threats, and ethical with hacktivists.
Spear Phishing
a type of phishing attack that targets a specific individual, group or organization.
Bloatware
Unwanted or hidden software installed by the manufacturer or vendor on a new computer, device, or application.
Vishing
a cyberattack that involves tricking people into giving away sensitive information over the phone.
Smishing
a type of cybercrime that uses deceptive text messages to trick people into sharing sensitive information or performing actions that compromise their security.
Pretexting
creating a fake scenario to trick a victim into giving away sensitive information.
Business email compromise (BEC)
tricking people into sending money or sharing sensitive information through email.
Typo squatting
a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser