Key Terms Flashcards
What is a DOS attack?
DOS = Denial of Service
when real users are unable to access systems or devices because of an attack
What is a DDOS attack?
DDOS = distributed denial-of-service attack
when multiple computers operate together to attack one target
What is malware?
Malware is intrusive software that is designed to damage and destroy computers and computer systems.
Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
What is a worm?
a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems
What is a Trojan Horse?
type of malware that downloads onto a computer disguised as a legitimate program.
What is scareware?
A common scareware definition is a cyberattack that scares people into visiting spoofed or infected websites or downloading malicious software (malware). Scareware can come in the form of pop-up ads that appear on a user’s computer or spread through spam email attacks.
A scareware attack is often launched through pop-ups that appear on a user’s screen, warning them that their computer or files have been infected and then offering a solution. This social engineering tactic aims to scare people into paying for software that purportedly provides a quick fix to the “problem.” However, rather than fix an issue, scareware actually contains malware programmed to steal the user’s personal data from their device.
What is a botnet?
A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
What is a zombie?
In computing, a zombie is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks.
What is the CIA triad?
Confidentiality, integrity and availability is a model designed to guide policies for information security within an organization.
What is the NIST Cybersecurity Framework?
NIST Cybersecurity Framework is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology (NIST) based on existing standards, guidelines, and practices
What is risk appetite?
The types and amount of risk, on a broad level, an organization is willing to accept in its pursuit of value/business objectives.
What is risk assessment?
The process of comprehending the nature of risk and determining the level of risk.
What is a control baseline?
The set of controls that apply to information or an information system to meet legal, regulatory, or policy requirements.
What is risk management
The process of managing risks to an organization.
What is an on-path attack?
When an aggressor that sits in the center between two stations and can catch, and sometimes, change that data that is being sent intelligently across the organization.