Cybersecurity Flashcards
the use of digital communications to trick people into revealing sensitive data or deploying malicious software.
Phishing
Some of the most common types of phishing attacks today include:
Business Email Compromise (BEC): A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
Spear phishing: A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
Whaling: A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
Vishing: The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
Smishing: The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
a manipulation technique that exploits human error to gain private information, access, or valuables.
Social engineering
Some of the most common types of social engineering attacks today include:
Social media phishing: A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.
Watering hole attack: A threat actor attacks a website frequently visited by a specific group of users.
USB baiting: A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.
Physical social engineering: A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.
a type of computer virus that can duplicate and spread on its own without human involvement.
worm
malicious code written to interfere with computer operations and cause damage to data and software.
computer virus
The virus attaches itself to programs or documents on a computer, then spreads and infects one or more computers in a network.
A current or former employee, external vendor, or trusted partner who poses a security risk
Internal threat
The practice of keeping an organization’s network infrastructure secure from unauthorized access
Network security
Any circumstance or event that can negatively impact assets
Threat
An organization’s ability to manage its defense of critical assets and data and react to change
Security posture
… … … identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Digital forensic investigators
An application that collects and analyzes* log data* to monitor critical activities in an organization
Security information and event management (SIEM)
When security analysts need to review vulnerabilities, they conduct a periodic security audit. This is a review of an organization’s records, activities, and related documents. During audits, Security Information and Event Management (SIEM) tools help analysts better understand security threats, risks, and vulnerabilities.
A review of an organization’s security controls, policies, and procedures against a set of expectations
Security audit
Software designed to harm devices or networks
malware
Some of the most common types of malware attacks today include:
Viruses: Malicious code written to interfere with computer operations and cause damage to data, software, and hardware. A virus attaches itself to programs or documents, on a computer. It then spreads and infects one or more computers in a network.
Worms: Malware that can duplicate and spread itself across systems on its own.
Ransomware: A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.
Spyware: Malware that’s used to gather and sell information without consent. Spyware can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.
a specific type of PII that falls under stricter handling guidelines and may include social security numbers, medical or financial information, and biometric data, such as facial recognition.
Sensitive personally identifiable information, (SPII)
If SPII is stolen, this has the potential to be significantly more damaging to an individual than if PII is stolen.
any information used to infer an individual’s identity. It includes someone’s full name, date of birth, physical address, phone number, email address, internet protocol, or IP address, and similar information.
Personally identifiable information (PII)
a security violation, in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, altered, or used by an individual unauthorized to do so
data breach
A data breach, for example, affects everyone that is associated with the organization. This is because data losses or leaks can affect an organization’s reputation as well as the lives and reputations of its users, clients, and customers.