CYBRSCRTY-MODULE 1 Flashcards
Advanced Persistent Threat (APT)
A class of attacks that use innovative attack tools to infect and silently extract data over an extended period of time
Attack vector
A pathway or avenue used by a threat actor to penetrate a system
Attributes
Characteristic features of the different groups of threat actors
Authority
A social engineering principle that involves directing others by impersonating an authority figure or falsely citing their authority
Availability loss
The loss that results from making systems inaccessible
Black hat hackers
Threat actors who violate computer security for personal gain or to inflict malicious damage
Cloud platforms
A pay-per-use computing model in which customers pay only for the online computing resources they need
Competitors
Threat actors who launched attacks against an opponent’s system to steal classified information
Consensus
A social engineering principle that involves being influenced by what others do
Credential harvesting
Using the Internet and social media searches to perform reconnaissance
Criminal syndicates
Threat actors who have moved from traditional criminal activities to more rewarding and less risky online attacks
Data breach
Stealing data to disclose it in an unauthorized fashion
Data exfiltration
Stealing data to distribute it to other parties
Data loss
The destruction of data
Data Storage
Third-party facilities used for storing important data
Default settings
Settings that are predetermined by the vendor for usability and ease of use (but not security) so the user can immediately begin using the product
Direct access
An attack vector in which a threat actor can gain direct physical access to the computer
Dumpster diving
Digging through trash receptacles to find information that can be useful in an attack
Eliciting information
Gathering data
Errors
Human mistakes in selecting one setting over another without considering the security implications
External
External entities outside of the organization
Familiarity
A social engineering principle that portrays the victim as well known and well received
Financial loss
The monetary loss as a result of lost productivity
Firmware
Software that is embedded into hardware to provide low-level controls and instructions
Gray hat hackers
Hackers who attempt to break into a computer system without the organization’s permission to publicly disclose the attack and shame the organization into taking action
Hacker
A person who uses advanced computer skills to attack computers
Hacktivists
A group of attackers that is strongly motivated by ideology
Hoax
A false warning often contained in an email claiming to be from the IT department
Hybrid warfare influence campaign
Influence campaigns used on social media and other sources
Identity fraud/impersonation
Masquerading as a real or fictitious character and then playing out the role of that person with the victim
Identity theft
Taking personally identifiable information to impersonate someone
Influence campaigns
Using social engineering to sway attention and sympathy in a particular direction