Information Security Flashcards
Motivation of bad guys
Account theft and illegal funds transfer Stealing personal OR financial data Compromising computing or financial data Extortion Intellectual property theft Espionage Cyberwarfare Terrorism Pranksters Hacktivism Revenge
Data harvesters
infiltrate systems and collect data for illegal resale
Cash-out fraudsters
purchase data from data harvester and use stollen credit card data for illegal actions
Botnets OR zombie computers
Networks infiltrated and compromised machines controlled by central command and used for nefarious activities
Hacktivists
protesters seeking to make political point by leveraging tech tools
White hat hacker
Good guys
Black hat hacker
Bad guys
Social engineering
Tricking employees into revealing info without computers
Phishing
Tricking someone to install malicious software
spoofed email adress
altered to seem as if it came from another source
Zero-day exploits
Attacks that are so new they have not been clearly identified
Multi-factor authentication
Identity proven by presenting more than one item for proof credentials
Malware
Seeks to compromise a computing system without permission.
Methods of infection
Viruses
Worms
Trojand
Viruses
Programs that infect software OR file
Require executable
Worms
Automatically spread
Do not require an executable
Trojans
Masquerading as something else
Leading user to download and install
Goals of malware
Botnets or zombie networks Malicious adware Spyware Keylogger Screen capture Card skimmer RAM scraping Ransomware Blended threats
Malicious adware
programs installed without consent and later serve unwanted ads
Spyware
Software that monitors the users actions, networks traffic, or scans for files
Keylogger
records user keystrokes
Screen capturer
Captures the pixels
Card skimmer
Captures the data from a swipe cards magnetic strip
RAM scraping
Malicious code that scans computing memory for sensitive data