Cybersecurity Flashcards
unwelcomed attempts to steal, expose, alter, disable or detroy information thorugh unauthorized access to copmuter systems
cyber attacks
how do cybercriminals get into a system?
-Internal threats
-external threats
-malware
-social engineering
-software vulnerabilities
careless, ignorant, negligent behavior
using insecure wifi
-sending info to wrong party or storing it incorreclty
misplace or lost computing or storage hardware
without approvale, trusted parties, such as an employee or contractor shares sensitive customer data or properitary copmany technology
-associated with disgruntled employees
malicious behavior
information security attack associated with: social engineering, malicious software, software vulnerabilities
external threats
software designde to disrupt computer operation, gather sensitive informaion, or gain unauthorized access to computer systems
malicious software
art of manipulating people into performing actions or divulging info that can harm the secuirty of their systems
Social engineering
errors in software or desgin weaknesses that can be exploited to gain access or install malicious software
software vulnerabilities
What are some types of malware
spyware
ntnets
viruses
worms
trojan horse
to gather information
spyware
take over many computers for use in proxy attacks. can sometimes swamp a network
botnets
Infect a software and when run it infects other software, carries payload that causes harm
virsues
propagate through the network without user action and carries payload to cause harm, can swamp network
worms
invites users to run seemingly legitinate software that in-turn installs malicious code
trojan horse
Restricts access to the infected computer system in some way for the restrictions to be removed
Ransomware
sometimes try to take advantage of the critical nature of data and data access
ransomware
lying to and deceiving legitimiate users
tricking them into divulging restricted information or granting unauthorized access
social engineering
falling for a phishing attack is an example of
social engineering
targeted toward a specific individual, organization or business
spear phishing
inappropiate use of backdoors is an example of
software vulnerabilites
code designed into software programs to allow access to the the application by
circumventing password protection
bugs in code is an example of
software vulnerabilites
unintentionally created flaw in code
bugs in code
attacks that exploit a vulnerability a developer has NOT had time to address and patch
zero-day attack
the method hackers use to attack systems with a perviously unidentified vulnerability
zero-day exploit
what was the heartbleed bug?
zero-day vulnerability in the open SSL encryption library used to secure traffic between web servers and computers
used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
SQL injection attack
what are the goals of cybercriminals
-steal time
-steal data
-steal money
-wreak havoc
unauthorized use of a machine’s computing ability
steal time
what are examples of steal time
cryptojacking: using your machine for calculations needed for bitcoin mining without your consent
- making a “bot” of your machine: using malware youve installed to make your machine part of a”botnet” used ot launch a distributed denial of service (dos) atttack
unauthorized access to data- where it’s gathered, transmitted or at rest
steal data
in equifax, criminals accessed a system through a web-application vulnerability that was known and for a correction had been availabile for 2 months, this is an example of
steal data
using stole credentials
steal money
log into the vicitims bank account and create electronic funds transfers to the perp’s account is an example of
steal money
using ransomware
steal money
with cryptolocker trojan, encrypted files on the affected system and demanded ransom in the forms of bitcoin, this is an example
steal money