Deck 1 Flashcards
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adversarial artificial intelligence (AI):
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
Business Email Compromise (BEC):
Malicious code written to interfere with computer operations and cause damage to data and software
Computer virus:
An attack that affects secure forms of communication between a sender and intended recipient
Cryptographic attack:
Any person who uses computers to gain access to computer systems, networks, or data
Hacker:
Software designed to harm devices or networks
Malware:
An attempt to access password secured devices, systems, networks, or data
Password attack:
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
Phishing:
A security incident that affects not only digital but also physical environments where the incident is deployed
Physical attack:
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
Physical social engineering:
A manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible.
Social engineering:
A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
Social media phishing:
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
Spear phishing:
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
Supply-chain attack:
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
USB baiting:
Refer to “computer virus”.
A virus needs to be initiated by a user (i.e., a threat actor), who transmits the virus via a malicious attachment or file download. When someone opens the malicious attachment or download, the virus hides itself in other files in the now infected system. When the infected files are opened, it allows the virus to insert its own code to damage and/or destroy data in the system.
Virus:
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
Vishing:
A type of attack when a threat actor compromises a website frequently visited by a specific group of users
Watering hole attack:
is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cybersecurity (or security)
is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.
Compliance
are guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security frameworks