Cyber Vulnerabilites Flashcards
Software designed to harm or exploit vulnerabilities, such as viruses, worms, and ransomware.
Malware
Social engineering attacks tricking individuals into providing sensitive information, like usernames and passwords.
Phishing
Inadequate password policies, unpatched software, and lack of encryption exposing vulnerabilities.
Weak Security Practices
User errors, like accidental data deletion or misconfigurations, compromising security.
Human Errors
Using outdated or unsupported software leaves systems open to known vulnerabilities.
Outdated Software
Poor network security measures like weak firewalls and unsecured wireless networks.
Insufficient Network Security
Unknown vulnerabilities exploited before developers can patch them.
Zero-Day Exploits
Physical theft or damage of computers leading to data breaches.
Physical Security Breaches
Malicious or negligent actions from within an organization.
Insider Threats
Vulnerabilities introduced by third-party vendors and software.
Third-Party Risks
Compromised software or hardware from suppliers, affecting all users of these products.
Supply Chain Attacks
Inadequate security measures in Internet of Things devices introducing new risks.
IoT Vulnerabilities
Employees not trained to recognize and respond to security threats becoming cybersecurity liabilities.
Lack of Employee Training
Sophisticated, prolonged attacks targeting specific organizations or nations.
Advanced Persistent Threats (APTs)
Unintentional exposure of sensitive data through misconfigurations or carelessness.
Data Leakage
Increased targeting of smartphones and tablets for business use leading to new security challenges.
Mobile Device Vulnerabilities
Vulnerabilities in cloud computing like data breaches and compromised credentials.
Cloud Computing Risks
Techniques like pretexting, baiting, and tailgating used to manipulate individuals into breaking security protocols beyond just phishing.
Other Social Engineering Tactics