Foundations: Module 2 Flashcards

1
Q

Phishing

A

Using fake messages to trick people into giving away personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Email Compromise (BEC)?

A

An attacker pretends to be someone from work in an email to fool others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear Phishing?

A

A fake email sent to a specific person to trick them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

A phishing attack targeting important people like company executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Tricking people using phone calls to get private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

Using text messages to trick people into sharing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Software designed to harm devices or networks, often to gain money or intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Viruses

A

Harmful code that spreads when someone clicks a bad link or opens an infected file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

Malware that copies itself and spreads on its own without anyone doing anything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

An attack where hackers lock your data and ask for money to unlock it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Malware that secretly steals and sells your info, like messages and location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

A

A trick that takes advantage of people making mistakes to get access or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Media Phishing

A

Using someone’s social media to collect info and create attacks that feel personal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Watering Hole Attack

A

Hacking websites that certain people often visit to secretly infect their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB Baiting

A

Leaving infected USB drives to trick users into plugging them in, spreading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Social Engineering

A

Pretending to be someone trusted to sneak into secure places.

17
Q

Social Engineering Principles

A

Using tricks like acting important, rushing people, or pretending to be trustworthy to fool someone.

18
Q

Authority

A

Pretending to be someone important to take advantage of how people usually respect authority.

19
Q

Intimidation

A

Using threats or pressure to force victims into compliance.

20
Q

Consensus/Social Proof

A

Tricking people by saying others already went along with it, so it seems real.

21
Q

Scarcity

A

Making something seem rare or urgent so people feel rushed to act fast.

22
Q

Familiarity

A

Faking a personal bond to make someone trust you and let their guard down.

23
Q

Trust

A

Slowly building fake trust with someone to get their private information.

24
Q

Urgency

A

Pushing someone to act fast so they don’t have time to think or ask questions.

25
Q

Adversarial Artificial Intelligence (AI)

A

Using AI or machine learning to make cyberattacks faster and smarter.

26
Q

CISSP

A

Certified Information Systems Security Professional? globally recognized cybersecurity certification.

27
Q

Cryptographic Attack

A

An attack that tries to break or spy on secure messages between two people.

28
Q

Hacker

A

A person who uses computers to access systems, networks, or data; legally or illegally.

29
Q

Password Attack

A

Trying to break into systems or data that are locked with a password.

30
Q

Physical Attack

A

A cyberattack that also affects real-world places or equipment.

31
Q

Supply-Chain Attack

A

An attack that sneaks in by messing with software or hardware before it reaches the user.