Midterm Flashcards
Failing to change your mindset about cybersecurity
Laxity
1 reason your sensitive Personally Identifiable Information(PII) will be successfully breached at some point
Laxity
1 reason you will become an “Inadvertent Actor” withouth knowing
Laxity
Hacking groups whose mission is defined by their government
Nation state sponsored
The digital mafia
Cybercriminal Threat Actors
Groups that hack in the name of a cause or political issue
Hacktivists
-Millions of individual users participate anonymously
-Main attack vector is Distributed Denial of Service (DDoS)
Hactivists
also known for breaching major databases containing sensitive personal information
Hactivist Groups
individuals or organizations that send irrelevant or unsolicited messages over the Internet, typically to large numbers of users, for the purposes of advertising, phishing or spreadinh malware with the main intent of financial gain.
Spammer’s and Phisher’s
those who specifically target your social media profiles with the intent of taking over your account in order to masquerade as you.
Social Media Threat Actors
Create a “trust factor” to make you open links to walfare
Social Media Threat Actors
Scam friends into disclosing their PII
Social Media Threat Actors
using the “trust factor” to spread malware to your entire friends list.
Social Media Threat Actors
those who deploy fake wireless access points that use no security (Open Wifi)
MitM Threat Actors
Attacker can create exact replica’s of Banking Site’s to glean your financial info
MitM Threat Factors
Attacker can intercept, send and receive data never meant to be for them without either outside party knowing until it is too late
MitM Threat Factors
an exceptionally savvy threat actor who is well versed in multiple hacking techniques
12 year old neighbor
have been exposed to computer technology since birth
Gen-Z and Gen-Alpha
Capable of creating new and unseen attack vectors aka Zero-Day attacks
12 year old neighbor
Keep network security analysts employed
12 year old neighbor
a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication
Phishing
typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site
Phishing
what can u do for fake supports or updates
WINDOWS: Ctrl-Alt-Del–Task Manager
APPLE: Command-Option-Esc–Force quit menu
alternate form of payment to cash, credit cards, and checks. Technology behind it allows u to send it directly to others without going through a 3rd party like bank. Using a crypto-wallet
Cryptocurrency