Cybersecurity Flashcards
unwelcomed attempts to steal, expose, alter, disable or detroy information thorugh unauthorized access to copmuter systems
cyber attacks
how do cybercriminals get into a system?
-Internal threats
-external threats
-malware
-social engineering
-software vulnerabilities
careless, ignorant, negligent behavior
using insecure wifi
-sending info to wrong party or storing it incorreclty
misplace or lost computing or storage hardware
without approvale, trusted parties, such as an employee or contractor shares sensitive customer data or properitary copmany technology
-associated with disgruntled employees
malicious behavior
information security attack associated with: social engineering, malicious software, software vulnerabilities
external threats
software designde to disrupt computer operation, gather sensitive informaion, or gain unauthorized access to computer systems
malicious software
art of manipulating people into performing actions or divulging info that can harm the secuirty of their systems
Social engineering
errors in software or desgin weaknesses that can be exploited to gain access or install malicious software
software vulnerabilities
What are some types of malware
spyware
ntnets
viruses
worms
trojan horse
to gather information
spyware
take over many computers for use in proxy attacks. can sometimes swamp a network
botnets
Infect a software and when run it infects other software, carries payload that causes harm
virsues
propagate through the network without user action and carries payload to cause harm, can swamp network
worms
invites users to run seemingly legitinate software that in-turn installs malicious code
trojan horse
Restricts access to the infected computer system in some way for the restrictions to be removed
Ransomware
sometimes try to take advantage of the critical nature of data and data access
ransomware
lying to and deceiving legitimiate users
tricking them into divulging restricted information or granting unauthorized access
social engineering
falling for a phishing attack is an example of
social engineering
targeted toward a specific individual, organization or business
spear phishing
inappropiate use of backdoors is an example of
software vulnerabilites
code designed into software programs to allow access to the the application by
circumventing password protection
bugs in code is an example of
software vulnerabilites
unintentionally created flaw in code
bugs in code
attacks that exploit a vulnerability a developer has NOT had time to address and patch
zero-day attack