Cybersecurity Essentials Flashcards
In the context of cybersecurity, what term describes an area that needs protection, possibly bounded by logical or physical limits, and is subject to control and authority within a specific system?
Domain
What term is exemplified by Google, Facebook, and LinkedIn in the context of the Internet, where each represents a controlled area for data collection, user interaction, and providing services, utilizing user-contributed information like personal data, interests, and professional connections?
Domain
In the context of cybersecurity, who are individuals with limited skills, often using pre-made tools or online instructions to conduct attacks, ranging from mere curiosity to attempts at causing harm, and can still cause significant damage despite their basic approach?
Amateurs
What term describes individuals who infiltrate computers or networks with varying intentions, classified as white, gray, or black hats based on their methods and motives, ranging from identifying and improving system security to exploiting vulnerabilities for illegal gains?
Hackers
Who are the ethical cyber specialists that use their programming knowledge for legal and ethical purposes, conducting penetration tests to identify and report security vulnerabilities, and may receive rewards or bounties for their findings?
White hat hackers
What term is used for individuals who may operate without ethical approval, compromise systems without permission, and potentially reveal vulnerabilities either publicly or to the organization affected, not necessarily for personal gain but often in ethically ambiguous situations?
Gray hat hackers
What is the designation for cybercriminals who intentionally breach computer and network security for personal benefit or to inflict harm, exploiting vulnerabilities to compromise systems?
Black hat hackers
What term encompasses the range of groups that operate in the cyber realm including professional criminal organizations, hacktivists, terrorists, and government-funded entities, all of whom may engage in sophisticated and targeted cyber operations for various motives like profit, political activism, espionage, or sabotage?
Organized hackers
What term refers to cyber activists who engage in hacking to make political statements, often by exposing sensitive information to raise awareness about various issues, and differs from state-sponsored attackers who conduct cyber espionage or sabotage for national interests?
Hacktivists
What type of hacker would work with ATM manufacturers to resolve security vulnerabilities after hacking into ATM machines using a laptop?
Grey Hat
What type of hacker would transfer $10 million to their bank account using victims’ account numbers and PINs recorded without their knowledge?
Black Hat
What type of hacker is tasked with identifying weaknesses within their company’s computer system?
White Hat
What type of hacker uses malware to compromise corporate systems and sell stolen credit card information to the highest bidder?
Black Hat
What type of hacker stumbles across a security vulnerability on a corporate network they are authorized to access while researching for exploits?
White Hat
What type of hacker collaborates with technology companies to fix a DNS flaw?
White Hat
What term, originated in the 1990s, describes young or inexperienced individuals who use pre-written scripts or tools to hack into systems, often without a profit motive but with the potential to cause harm?
Script Kiddies
Who are the individuals, often considered gray hat hackers, that seek out security weaknesses and report their findings to the vendors, sometimes in exchange for compensation or bounties?
Vulnerability Broker
What term is used for gray hat hackers who engage in online activism, protesting against political or social issues by publishing articles, videos, leaking sensitive data, and conducting DDoS attacks?
Hacktivists
What term describes black hat hackers who may operate independently or within organized groups, and are known for committing offenses that result in substantial financial losses for individuals and companies annually?
Cyber Criminals
What classification is given to hackers, viewed as white or black hat depending on perspective, that are supported by a nation’s government to infiltrate foreign entities to exfiltrate secrets, gather intelligence, and potentially disrupt networks?
State-Sponsored
Identifying cybersecurity countermeasure used to thwart cyber criminals:
The Honeynet Project
Early Warning Systems
Identifying cybersecurity countermeasure used to thwart cyber criminals:
The InfraGard Program
Sharing Intelligence
Identifying cybersecurity countermeasure used to thwart cyber criminals:
ISO/IEC 27000
ISM Standards
Identifying cybersecurity countermeasure used to thwart cyber criminals:
Cybersecurity Act
New laws
Identifying cybersecurity countermeasure used to thwart cyber criminals:
The Nation Common Vulnerabilities and Exposures (CVE) project
Vulnerability database
What tools do cybercriminals utilize to intercept and log data packets as they traverse a network, which can put sensitive information such as usernames, passwords, and financial details at risk, especially when used in conjunction with rogue devices in public spaces?
Packet-sniffing tools
What is the cyberattack technique that involves corrupting the cache of a DNS server by introducing false information, leading to the redirection of internet traffic to a fraudulent site or server instead of the intended destination?
DNS spoofing (or DNS cache poisoning)
What is another term for DNS spoofing, referring to the technique where attackers alter DNS records to redirect online traffic to a fraudulent website, thereby gaining access to sensitive data?
DNS cache poisoning
What is another term for DNS cache poisoning, referring to the technique where attackers alter DNS records to redirect online traffic to a fraudulent website, thereby gaining access to sensitive data?
DNS spoofing
What is the term for the act of creating and inserting illegitimate packets into an existing data stream to disrupt or redirect communication, often used in man-in-the-middle attacks by cybercriminals to intercept or manipulate information?
Packet forgery (or packet injection)
What is another term for packet forgery, which refers to the malicious act of generating and dispatching deceptive network packets that seem to be a part of a legitimate conversation or data transfer, often used to interrupt or meddle with an ongoing network communication?
Packet injection
What is another term for packet injection, which refers to the malicious act of generating and dispatching deceptive network packets that seem to be a part of a legitimate conversation or data transfer, often used to interrupt or meddle with an ongoing network communication?
Packet forgery
What is the cybersecurity threat called where a cybercriminal disrupts or intercepts packets within a network by inserting forged packets, leading to the hijacking of a legitimate session or denial of network service?
Man-in-the-middle attack
What is the name of the sophisticated computer worm discovered in 2010, known for targeting SCADA systems and is believed to have been designed to disrupt the Iranian nuclear program, representing one of the first instances of cyber warfare?
Stuxnet
What is the collective term for the practices, technologies, and processes designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access, which is essential at personal, corporate, and state levels for the protection of identities, data, and safety?
Cybersecurity
What term describes the practice of manipulating individuals psychologically to perform certain actions or reveal sensitive information, typically employed in malicious activities targeting security systems?
Social Engineering
What is the alternative term for ‘social engineering’ in the context of cybersecurity, referring to the technique of manipulating individuals into unintentionally compromising their own or their organization’s security?
Human hacking
What is the alternative term for ‘human hacking’ in the context of cybersecurity, referring to the technique of manipulating individuals into unintentionally compromising their own or their organization’s security?
Social engineering
What type of social engineering attack involves enticing victims with a promise of goods, such as free downloads, to obtain their login credentials, and can also occur through physical means like USB drives exploiting human curiosity?
Baiting
What term describes the act of obtaining confidential information by directly observing someone as they enter a PIN at an ATM, fill out a form, or type sensitive data, often done in crowded places or from a distance with visual aids, and can be prevented by physical shielding methods?
Shoulder surfing
What is the term for a social engineering technique where attackers create a fabricated scenario to deceive victims into divulging sensitive information, often targeting organizations by impersonating authority figures or clients through phone, email, or text?
Pretexting
What term refers to the fraudulent practice where attackers disguise themselves as reputable entities via emails or phone calls, aiming to deceive individuals into providing sensitive personal information like usernames, passwords, and credit card details?
Phishing
What is the name of the cyberattack method that is a more targeted form of phishing, where attackers select specific individuals or organizations and tailor their deceptive communications to appear more legitimate to those particular victims?
Spear phishing
What term is used for a specialized form of phishing attack where the primary targets are high-ranking officials like CEOs or CFOs, involving highly customized and sophisticated methods to deceive these high-profile individuals?
Whaling
What is the type of malware attack where cybercriminals encrypt a victim’s data and demand payment for its decryption, with no assurance of actually restoring the data, affecting various sectors including finance, government, healthcare, and education?
Ransomware
What term is used for a type of malicious software that tricks users into downloading and installing fake antivirus programs or other security solutions by exploiting their fear of viruses and threats?
Scareware