Information Security Flashcards
Motivation of bad guys
Account theft and illegal funds transfer Stealing personal OR financial data Compromising computing or financial data Extortion Intellectual property theft Espionage Cyberwarfare Terrorism Pranksters Hacktivism Revenge
Data harvesters
infiltrate systems and collect data for illegal resale
Cash-out fraudsters
purchase data from data harvester and use stollen credit card data for illegal actions
Botnets OR zombie computers
Networks infiltrated and compromised machines controlled by central command and used for nefarious activities
Hacktivists
protesters seeking to make political point by leveraging tech tools
White hat hacker
Good guys
Black hat hacker
Bad guys
Social engineering
Tricking employees into revealing info without computers
Phishing
Tricking someone to install malicious software
spoofed email adress
altered to seem as if it came from another source
Zero-day exploits
Attacks that are so new they have not been clearly identified
Multi-factor authentication
Identity proven by presenting more than one item for proof credentials
Malware
Seeks to compromise a computing system without permission.
Methods of infection
Viruses
Worms
Trojand
Viruses
Programs that infect software OR file
Require executable
Worms
Automatically spread
Do not require an executable