Foundation OF CYBERSECURITY Flashcards

Glossary

1
Q

Adversarial artificial intelligence (AI)

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Email Compromise (BEC)

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CISSP?

A

Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password attack

A

An attempt to access password secured devices, systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social media phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.

17
Q

Virus

A

refer to “computer virus”

18
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

19
Q

Watering hole attack

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users.

20
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data.

21
Q

Worm

A

Example of Malware: Malware that self-replicates, spreading across the network and infecting computers.

22
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access.

23
Q
A