Domain 1 Flashcards
is the art of exploiting human behavior by convincing someone to reveal information or perform an activity, these attacks can occur in person, via email, and over the phone
Social Engineering
is the act of attempting to gather personal or sensitive information through fraudulent emails. is the most common form of social engineering attack related to computer security
Phishing
is the act of attempting to gather personal or sensitive information through fraudulent SMS (short message services, better known as texting) works primarily due to the use of urgency and intimidation in the message
Smishing
Is the act of attempting to gather personal or sensitive information through fraudulent phone calls, This video demonstrates the use of (***) to steal someone’s cell phone credentials
Vishing
is unwanted commercial emails that are sent out in bulk via email
Spam
SPIM is unwanted commercial emails that are sent out in bulk via instant messages
Spam Over Instant Messaging
is a term created to refer to a phishing attack that targets a specific person or group of people with something in common
Spear Phishing
is the act of attempting to gather personal or sensitive information from trash dumpstersAn attacker may gather a variety of information that can be useful in a social engineering attack10
Dumpster Diving
is the act of secretly observing a person’s computer screen or keyboard to gather personal or sensitive informationThe attacker directly observes the individual entering sensitive information on a form, keypad, or keyboard
Shoulder Surfing
is the act of directing internet users to a malicious website to gather personal or sensitive informatio
Pharming
is the act of following an authorized person into a restricted area without providing credentialsAlso known as piggybacking
Tailgating
Is the act of encouraging a person to disclose personal or sensitive information Calls to or from help desk and tech support units can be used to ____ ______
Eliciting Information
is a type of phishing that targets high-profile individuals such as executivesThe sender must do some upfront research about the target as well as the subject in order to craft an e-mail that sounds convincing
Whaling
The attacker adds a story to the beginning of the message
Prepending
is the act of stealing personal information to impersonate the victim
Identity fraud
The act of sending spoofed invoices from a trusted source or business executive
Invoice Scams
The act of gaining access to a vast number of stored usernames and passwords, enabling an attacker a series of access passes to the system
Credential Harvesting
The act of engaging with a computer system to gather information about its possible weaknesses
Reconnaissance
is a false security threat that’s meant to entice a user to believe it’s real and disclose sensitive or personal information
Hoax
The act of masquerading as a legitimate or trusted individual or entity
Impersonation
The act of infecting a frequently visited website with malware
Watering Hole Attack
also known as URL hijacking) is the act of presenting users with a fake site that has a similar URL
Best defense against this is to register those domains with all deviations of the designated site
Typosquatting
A social engineering tactic where the attacker creates a false scenario to steal the victim’s personal information
An example is an attacker calling to verify personal information with the victim
Pretexting
are an attempt to shift public opinion through the use of social media platforms
Influence Campaign
A military strategy that employs conventional warfare and unconventional means in the battlefield
Information is used to sway people toward a position favored by those spreading it
Hybrid Warfare
refers to websites that allow users to post and share content within a digital community
Social Media
Authority
•The attacker impersonates a high-level executive or an IT support person
Intimidation
•The attacker attempts to scare or threaten the victim
Consensus
•The attacker claims that others are performing the requested action
Principles (reasons for effectiveness)
Scarcity
•The attacker claims limited availability for a prize or reward
Familiarity
•The attacker poses as a familiar figure or builds rapport over time before conducting a social engineering attack
Trust
•The attacker uses his or her good relationship with the victim to conduct the social engineering attack
Urgency
•The attacker scares or threaten the victim to perform an action within a short amount of time
Principles
is term given to a program intended to damage a computer system
Malware
is malware designed to lock a victim’s computer or data until money is paid to the attacker
Ransomware
are malicious applications that misleads victims by appearing as a trusted file or application
Trojans
is a type of malware with the objective of spreading rapidly
Worm
are programs like spyware and adware that are downloaded along with the program the user consented to download
Potentially Unwanted Program (PUPS)
is a type of malware that uses a system’s software and applications to hide and execute its operations
Fileless Virus
gives instructions to the botnet and is the central management center to conduct cyber-attacks
Command and Control
Computer programs that automate a previously repetitive and task.
Bots
uses encryption to deny the victim access to his or her data
Also the name given to malware used to mine crypto
Cryptomalware
are malware designed to execute on a future date or event
Logic Bombs
is malware designed to steal a victim’s personal information online
Spyware
capture the victim’s keystrokes to steal credentials or personal information
Keylogger
are malicious programs that installs a backdoor on the victim’s computer
Remote Access Trojans (RAT)
are malicious programs that allow attackers to control a victim’s computer remotely
Rootkits
an undisclosed way to gain access to a system or application
Backdoor
The attacker attempts to gain access to a large amount of usernames through commonly used passwords
Spraying
The attacker attempts to gain access to a password-protected resource by entering every word in a ________ as a password
Dictionary
The attacker attempts every possible combination of letters, numbers, and special characters to guess the user’s credential
Brute Force
are pre-assembled tables for reversing encrypted hashes, typically password hashes
Rainbow Table
An attacker can launch a known ______ attack if he has samples of both the ? and the ciphertext
Plaintext
A USB drive that appears harmless but contains might contain ransomware or a keylogger that transmits back to the attacker’s command and control server
Malicious Flash Drive
The attacker creates a copy of a legitimate card to steal its credentials
Card Cloning
Attackers capture credit card information illegally through fake credit card readers
Skimming
A technique to make systems capable of machine learning more resilient by exposing them to malicious scenarios
Adversarial artificial intelligence (AI)
The attacker inputs malicious data to a system or application while its in its training process
Tainted training data for machine learning (ML)
Attackers might try new approaches to find security holes in the machine learning algorithm
Security of machine learning algorithms
Attackers might try new approaches to find security holes in the machine learning algorithm
Supply-chain attacks
attacks have less physical impact than on-premise attacks and are more resilient due to the lower cost to back-up data.
Cloud Based
The attacker attempts to find a match to a hash by identifying portions based off probability
Birthday
occurs when two different inputs produce the same hash value
Collison
The attacker negotiates for a less secure protocol to communicate with hosts and servers
Downgrade
Attackers try to work their way up from a basic user account to an account with administrative access
Privilege Escalation
An application vulnerability that allows an attacker to inject malicious data
Cross-site scripting
The attacker inserts malicious code into an application
Injection
An attacker inserts malicious code to obtain or delete data from the database
Structured query language (SQL)
is a collection of code that is designed to be used as needed by a computer process
Dynamic Link Library (DLL)
is performed by replacing a valid DLL file with a malicious DDL file
DLL Injection Attack
The attacker exploits input validation vulnerabilities to execute commands to the LDAP servers
Lightweight Directory Access Protocol (LDAP)
The attacker injects XML code directly into the application to manipulate its operations
Extensible Mark Up Language (XML)
occurs when a program attempts to read or write to memory with a NULL pointer
Pointer/object dereference
The attacker manipulates the file system structure on a web server to search for unsecured files
Directory Traversal
The attacker attempts to crash or hang up the application by injecting more data than intended for the application
Buffer Overflow
occurs when a process produces an unexpected result due to timing
Race Condition
The attacker attempts to access a file between the first time the program accesses the file and usage of file
Time of check/time of use
is the ability for an application to catch errors and provide user-friendly feedback to the user, without crashing the application
Error Handling
occurs when an error message that’s displayed to an end user provides clues about how an application operates
Improper Error Handling
occurs when an attacker intercepts secure communication and fraudulently resends or misdirects the communication
Replay Attack
The attacker repeats valid transmission data between a legitimate user and server
Session Replays
occur when a user’s input exceed the boundaries of integer variables
Integer overflows
The attacker attempts to bypass the input validation countermeasures on a server to gain access to sensitive data
Server-side validation
With a web-based service, the attacker performs legitimate but unauthorized actions on a user’s account
Cross side request forgies
allows applications to communicate and respond to each other
An attacker can target an *** to gain administrative access or modify its intended behavior by discovering flaws in its implementation
application programming interface (API)