Module Two Flashcards

1
Q

Computer Virus

A

malicious code written to interfere with computer ops and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering

A

manipulation technique that exploits human error to gain private info, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

use of digital comms to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BEC

A
  • business email compromise
    threat actor sends an email message that seems to be from a known source to make request for info, in order to obtain financial advantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

malicious email attack that targets specific user or group, email seems to be from trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

threat actor targets company executives to access sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

exploitation of electronic voice comm to obtain sensitive info or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

malware that can duplicate and spread itself across systems on its own
- does not need to be downloaded by user
- self replicates and spreads from infected computer to other devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

malicious attack where threat actors encrypt organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

malware used to gather and sell info without consent
- can be used to access devices, allowing threat actors to collect personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Media Phishing

A

threat actor collects info about target from social media sites, then initiates attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

threat actor attacks website frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

USB baiting

A

threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical social engineering

A

threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering Principles

A
  • authority
  • intimidation
  • consensus/social proof
  • scarcity
  • familiarity
  • trust
  • urgency
17
Q

CISSP Security Domains

A
  • Certified Info Systems Security Professional
  • 8 domains to organize the work of security professionals
18
Q

Security and risk management

A

defines security goals and objectives, risk mitigation, compliance, business continuity, and the law
- ex: updating company policies for private health info due to changes to HIPAA

19
Q

Asset Security

A

secures digital/physical assets, also related to the storage, maintenance, retention, and destruction of data
- ex: proper disposal of old equipment that once housed private data

20
Q

Security architecture and engineering

A

optimizes data security by ensuring effective tools, systems, and processes are in place
- ex: configuring a firewall

21
Q

Communication and Network Security

A

manage and secure physical networks and wireless comms
- ex: analyze user activity within org

22
Q

Identity and access management

A

keeps data secure by ensuring users follow est policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications
- ex: setting up employee keycard access

23
Q

Security assessment and testing

A

conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities
- ex: conducting audit of user permissions to ensure correct level of access

24
Q

Security operations

A

conducting investigations and implementing preventative measures
- ex: you receive an alert that an unknown device has connected to your internal network, and have to follow est procedure to stop potential threat

25
Q

Software Development Security

A

uses secure coding practices, which are a set of recommended guidelines to create secure apps and services
- ex: advise on password policies for a new app in development

26
Q

Password attack

A

attempt to access password-secured devices, systems, networks, or data
fall under communication and network security domain

27
Q

Physical attack

A

incident that affects not only digital but also physical environments where the incident is deployed
- malicious USB cable, flash drive, card cloning and skimming

28
Q

Adversarial artificial intelligence

A

technique that manipulates ai and machine learning tech to conduct attacks more efficiently
- falls under comm/network security and the identity and access management domains

29
Q

supply-chain attack

A

targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
- falls under: security and risk management, security architecture and engineering, and security ops domains

30
Q

Cryptographic attack

A

affects secure forms of comm between sender and intended recipient
- forms: birthday, collision, downgrade
- falls under comm and network security domain

31
Q

advanced persistent threats

A

have significant expertise accessing orgs network without authorization
- tend to research targets in advance
- motives: damaging critical infrastructure, gaining access to IP

32
Q

Insider Threats

A

abuse their authorized access to obtain data that nay harm an org
- motives: sabotage, corruption, espionage, unauthorized data access or leaks

33
Q

Hacktivists

A

driven by political agenda
-motives: demonstrations, propaganda, social change campaigns, fame

34
Q

hacker

A

person who uses computers to gain access to computer systems, networks, or data
- ethical hackers, semi-authorized (research for vulnerabilities), unethical/unauthorized