CompTIA CySA+ CS0-003 Deck 2 Flashcards
Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.
On-Premises
Software or services installed and managed on a customer’s computing infrastructure rather than in the cloud or hosted by a third-party provider.
(SaaS) Software As A Service
Cloud service model that provisions fully developed application services to users.
Software Repository
A centralized storage location for software packages.
Footprint
An attack that aims to list resources on the network, host, or system as a whole to identify potential targets for further attack.
Change Management
Process through which changes to the configuration of information systems are implemented as part of the organization’s overall configuration management efforts.
Nation-States
A type of threat actor that is supported by the resources of its host country’s military and security services.
Organized Crime
A type of threat actor that uses hacking and computer fraud for commercial gain.
Hacktivist
A threat actor that is motivated by a social issue or political cause.
Insider Threat
Type of threat actor who is assigned privileges on the system and causes an intentional or unintentional incident.
Script Kiddie
An inexperienced, unskilled attacker that typically uses tools or scripts created by others.
(APT) Advanced Persistent Threat
Threat actors with the ability to craft novel exploits and techniques to obtain, maintain, and diversify unauthorized access to network systems over a long period.
Virus
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
Trojan
A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
(C&C or C2) Command and Control
Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
Exploits
A specific method by which malware code infects a target host, often via some vulnerability in a software process.