Cybersecurity Terms (Basic) Flashcards

1
Q

Software that automatically displays or downloads advertising material (often unwanted) when a user is online.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A method by which an authorized user can gain access to a system by bypassing normal security mechanisms.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious hackers who break into systems for personal gain or to cause harm. They often engage in illegal activities such as stealing data, vandalizing websites, and spreading malware.

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attempt to guess a password or PIN by systematically trying every possible combination of letters, numbers, and symbols until the correct one is found.

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming the target with a flood of Internet traffic.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Similar to DoS but the attack is launched from many computers (often part of a botnet) simultaneously.

A

DDoS (Distributed Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first step in the hacking process, where a hacker gathers information about a target system to find ways to intrude. It involves both passive and active reconnaissance techniques.

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the context of malware and antivirus, FUD refers to malware that is undetectable by antivirus software. Hackers aim to create FUD to keep their malicious activities hidden from security measures.

A

FUD (Fear, Uncertainty, and Doubt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hackers who fall somewhere between white hats and black hats. They might violate laws or ethical standards but usually without malicious intent. They may find a vulnerability and report it (sometimes requesting a fee for the fix) without permission.

A

Grey Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A method of trying to gather personal information using deceptive e-mails and websites.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A server that acts as an intermediary for requests from clients seeking resources from other servers. Proxies provide varying levels of functionality, security, and privacy.

A

Proxy

17
Q

A type of malicious software designed to block access to a computer system until a sum of money is paid.

A

Ransomware

18
Q

A type of malware that provides the attacker with administrative control over the target computer. RATs are typically downloaded invisibly with a user-requested program, such as a game or app.

A

RAT (Remote Access Trojan)

19
Q

A type of shell where the target machine connects back to the attacking machine. This is often used to bypass firewalls and other security measures that might block an incoming connection to the target machine.

A

Reverse Shells

20
Q

A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (such as to an unauthorized user) while masking its existence or the existence of other software.

A

Rootkit

21
Q

An unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

A

Script Kiddie

22
Q

Intercepting and logging traffic that passes over a digital network or part of a network.

A

Sniffing

23
Q

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

A

Social Engineering

24
Q

Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

A

Spyware

25
Q

A code injection technique used to attack data-driven applications by inserting malicious SQL statements into an entry field for execution (e.g., to dump the database contents to the attacker).

A

SQL Injection

26
Q

A text-based interface to the system. It provides the user with access to a shell, where commands can be entered to perform operations. The terminal is a powerful tool for managing system functions and scripts.

A

Terminal

27
Q

Free and open-source software for enabling anonymous communication. It directs internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage.

A

Tor (The Onion Router)

28
Q

A type of malware that is often disguised as legitimate software.

A

Trojan Horse

29
Q

A type of malicious software that, when executed, replicates by reproducing itself or infecting other programs by modifying them.

A

Virus

30
Q

A service that encrypts your internet connection and hides your IP address, providing online privacy and anonymity by creating a private network from a public internet connection.

A

VPN (Virtual Private Network)

31
Q

A virtual machine sold as a service by an Internet hosting provider. A VPS runs its own copy of an operating system, and customers have superuser-level access to that operating system instance.

A

VPS (Virtual Private Server)

32
Q

Ethical hackers who use their skills to improve security by finding and fixing vulnerabilities before malicious hackers can exploit them. They typically work with permission from the system owners.

A

White Hat

33
Q

A standalone malware computer program that replicates itself in order to spread to other computers.

A

Worm

34
Q

Refers to a vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

A

Zero-Day