Module 2 Flashcards
Phishing
use of digital communications to trick people into revealing sensitive data
Malware
software designed to harm devices or networks
Viruses
Malicious code written to interfere with computer operations and cause damage to data and software
Worms
Malware that can duplicate and spread itself across systems on its own - doesn’t need to be downloaded (same network)
Ransomware
Malicious attack where threat actors encrypt an organisations data and demand payment to restore access
Spywhere
Malware used to gather and sell information without consent
Social engineering
Manipulation technique that exploits human error - gain info, access, valuables
Social media phishing
Threat actor collects detailed information about their target from social media sites, then initiate an attack
Watering hole attack
Threat actor collects details information about their target from social media sites, then initiate an attack
USB baiting
Threat actor attacks website frequently visited by specific group of users
Physical social engineering
Threat actor impersonates employee, customer, vendor to obtain unauthorized access to a physical location
Social engineering principles
Authority, intimidation, consensus/social proof, scarcity, familiarity, trust, urgency
Authority
Threat actors impersonate individuals with power
Intimidation
Threat actors use bullying tactics
Consensus/social proof
People do things they believe others are doing, threat actors use others’ trust to pretend they are legitimate
Scarcity
Tactic used to imply goods or services are in limited supply
Familiarity
Threat actors establish fake emotional connection with users that can be exploited