Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
Security+
> Malicious Updates > Flashcards
Malicious Updates Flashcards
Study These Flashcards
Security+
(67 decks)
Security Controls 1.1
The CIA Triad 1.2
Non-Repudiation 1.2
Authentication, Authorization, and Accounting 1.2
Gap Analysis 1.2
Zero Trust 1.2
Deception and Disruption 1.2
Change Management 1.3
Technical Change Management 1.3
Public Key Infrastructure (PKI) 1.4
Encrypting Data 1.4
Key Exchange 1.4
Encryption Technologies 1.4
Obfuscation
Hashing and Digital Signatures 1.4
Blockchain Technology 1.4
Certificates 1.4
Threat Actors 2.1
Threat Vectors 2.2
Phishing 2.2
Impersonation 2.2
Watering Hole Attack 2.2
Other Social Engineering Attacks 2.2
Memory Injections 2.3
Buffer Overflows 2.3
Race Conditions
Malicious Updates
Operating System Vulnerabilities 2.3
SQL Injection 2.3
Cross-Site Scripting 2.3
Hardware Vulnerabilities 2.3
Virtualization Vulnerabilities 2.3
Cloud Specific Vulnerabilities 2.3
Supply Chain Vulnerabilities 2.3
Misconfiguration Vulnerabilities 2.3
Mobile Device Vulnerabilities 2.3
Zero Day Vulnerabilities 2.3
An Overview of Malware 2.4
Viruses & Worms 2.4
Spyware & Bloatware 2.4
Other Malware Types 2.4
Physical Attacks 2.4
Denial of Service 2.4
DNS Attacks 2.4
Wireless Attacks 2.4
On Path Attacks 2.4
Application Attacks 2.4
Cryptographic Attacks 2.4
Password Attacks 2.4
Indicators of Compromise 2.4
Segmentation and Access Control
Mitigation Techniques 2.5
Hardening Techniques 2.5
Cloud Infrastructures 3.1
Network Infrastructure Concepts 3.1
Other Infrastructure Concepts 3.1
Infrastructure Considerations 3.1
Secure Infrastructures 3.2
Intrusion Prevention 3.2
Network Appliances
Port Security 3.2
Firewall Types 3.2
Secure Communication 3.2
Data Types and Classifications 3.3
States of Data 3.3
Protecting Data (Methods) 3.3
Resiliency 3.4