Mod 2 Attack Types Flashcards
Password Attack
An attempt to access password-secured devices, systems, network, or data. (i.e. Brute force, Rainbow table).
Related to “Communication and Network Security” domain.
Social Engineering Attack
A manipulation technique that exploits human error to gain private information, access, or valuables. (i.e. Phishing, Smishing, Vishing, Spear phishing, Whaling, Social media phishing, BEC, Watering hole attack, USB bating, Physical social engineering).
Related to “Security and Risk Management” domain.
Physical Attack
A security incident that affects not only digital but also physical environments where the incident is employed. (i.e. Malicious USB cable, Malicious flash drive, Card cloning and skimming)>
Related to “Asset Security’ domain.
Adversarial Artificial Intelligence
A technique that manipulates artificial intelligence and machine learning technology to conduct attacks more efficiently.
Related to both “Communication and Network Security” and the “Identity and Access Management” domains.
Supply-chain Attack
Targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.
Related to many domains, but commonly related to the “Security and Risk Management”, “Security Architecture and Engineering”, and “Security Operations” domains.
Cryptographic Attack
Affects forms of communication between a sender and intended recipient. (i.e birthday, collision, downgrade).
Related to “Communication and Network Security” domain.