Drill #2 Flashcards
data breach
release of secure information to an untrusted environment
DoS attack
The attackers seek to make a computer or network unavailable by flooding the targeted system with unnecessary service requests, which overload the system.
security vulnerability
A weakness on a network, computer, or software which can be exploited
exploit
Software or code—usually malicious—that takes advantage of a flaw or vulnerability.
zero-day
a vulnerability unknown to those who would be interested in securing it, which includes the good guys or the bad guys
zero-day exploit
Also known as “zero-day attack,” is an exploit that takes advantage of a zero-day vulnerability on its first day of release, before the vendor knows about it.
advanced persistent threat
a network attack in which an unauthorized person stays there undetected for a long period of time and steals data, rather than cause damage to the network or organization.
tailgating
Also known as piggybacking, tailgating is a method used by bad guys to gain access to a building or other protected areas. A tailgater waits for an authorized user to open and pass through a secure entry and then follows right behind.
keylogger
Malware or hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.
Bitcoin
An independent digital currency that uses encryption to regulate the generation of units of currency and verify the transfer of funds.
independently of a central bank.
money mule
A person recruited to quickly receive and turnaround funds involved in scams.
The person is often unaware of their role in the criminal act.