Module Two Flashcards
Computer Virus
malicious code written to interfere with computer ops and cause damage to data and software
Malware
software designed to harm devices or networks
Social engineering
manipulation technique that exploits human error to gain private info, access, or valuables
Phishing
use of digital comms to trick people into revealing sensitive data or deploying malicious software
BEC
- business email compromise
threat actor sends an email message that seems to be from a known source to make request for info, in order to obtain financial advantage
Spear Phishing
malicious email attack that targets specific user or group, email seems to be from trusted source
Whaling
threat actor targets company executives to access sensitive data
Vishing
exploitation of electronic voice comm to obtain sensitive info or to impersonate a known source
Worms
malware that can duplicate and spread itself across systems on its own
- does not need to be downloaded by user
- self replicates and spreads from infected computer to other devices on the same network
Ransomware
malicious attack where threat actors encrypt organization’s data and demand payment to restore access
Spyware
malware used to gather and sell info without consent
- can be used to access devices, allowing threat actors to collect personal data
Social Media Phishing
threat actor collects info about target from social media sites, then initiates attack
Watering hole attack
threat actor attacks website frequently visited by a specific group of users
USB baiting
threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network
Physical social engineering
threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location