Cybersecurity Fundamentals Week 5 Flashcards

1
Q

Black hat hackers (crackers)

A

Hackers who attempt to obtain unauthorized access to computer systems to damage their operations or to steal confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bot/Botnet

A

A computer system network that as been compromised and is under the attackers control. They are used to carry out diff schemes and cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Buffer overflow

A

Buffers that store data temporarily during a transfer.When data volume exceeds the memory buffers capacity, a buffer overflow occurs. When this happens memory areas are overwritten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Clickjacking

A

An attack that tricks victims into unintentionally clicking on a malicious link or button that is usually disguised as a harmless element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Command and control (c&c/c2)

A

A tactic used to communicate between a compromised system and an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common vulnerabilities and exposures (CVE)

A

A global program whose goal is to ID, define, and classify publicly disclosed cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Credential stuffing

A

A type of attack in which attackers utilize compromised lists of user credentials to infiltrate a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersecurity Framework

A

A collection of documentation that defines the best practices for organizations to manage and handle cyber threats. These decrease organizations exposure to weaknesses and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial-of-service attack (DoS, DDoS)

A

Attack designed to shut down a system or network by making its resources unavailable to users by overwhelming the target causing it to fail. DDoS is same but uses many more devices and has a more significant attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dictionary attack

A

A password attack that uses billions of potential passwords from a vast dictionary to discover a users password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Cache Poisoning

A

The act of providing a victim with a phony DNS record that redirects them to a different website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethical hacking

A

The process of detecting security vulnerabilities, bugs, misconfigurations, etc before attackers do to fix them. Aka penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exploit

A

A program, software, piece of data, or command that manipulates a system or computer bug to cause undesirable or unexpected behavior. It is not the malicious program itself, but the method attackers employ to deliver it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall

A

A tool that monitors incoming and outgoing network traffic to allow or deny connections aligned with security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Grey hat hacker

A

A hacker who doesn’t fit either the white or black hat hacker categories and who typically carries out penetration testing on networks without the owners consent. It’s not necessarily malicious, but it is illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP Flood

A

A type of DDoS attack when the attacker takes advantage of a genuine HTTP GET or POST request to target a web server or application.

17
Q

HTTPS spoofing

A

Attacker uses a domain that strongly resembles the target website to trick victims into believing they are visiting the actual website.

18
Q

ICMP(ping) flood

A

DDoS attack that attempts to overload a tarts device with many ICMP echo requests. (Pings)

19
Q

Mitre att&ck

A

A knowledge database and model for cyber attacker behavior representing the stages of an attack lifecycle.

20
Q

NICE Framework

A

A national resource that assist employers in enhancing their cybersecurity workforce. Establishes a common terminology for characterizing cybersecurity work and personnel, no matter where or for whom.

21
Q

Protecting

A

A type of social engineering attack involving pretexts to get unsuspecting persons to disclose sensitive information.

22
Q

SMB protocol

A

A network protocol that allows users to connect with various computers and servers to access their resources and distribute, open, and modify files.

23
Q

SYN Flood

A

DDoS attack that leverages the TCP three-way handshake to waste system resources and make the target server unavailable.

24
Q

Unknown exploit (zero day)

A

A vulnerability that is not disclosed to a programs developers and is typically found after it has been exploited.

25
Q

Vishing

A

Phishing attacks that uses phone calls.

26
Q

Worm

A

Malware that replicates itself and spreads across a network automatically. It takes advantage of security software weaknesses to execute harmful actions.

27
Q

Zero-day Attacks

A

Uses zero-day exploits to target unknown vulnerabilities. Since the vendor isn’t aware, there is no patch yet.