NSE 1 - Information Security Awareness Flashcards
What is ATP ? social engineering attack
Advance Threat Protection
ATP-relies on multiple types of security technologies, products, and research, each performing a different role, but still working seamlessly together to combat attacks from the core of the network to the end user device. The three-part framework is conceptually simple—prevent, detect, mitigate; however, it covers a broad set of both advanced and traditional tools for network, application and endpoint security, threat detection, and
What is Threat ?
A threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors
What is Attack ?
An attack, is the actual act of exploiting the information security system’s weaknesses.
What is APT ?
A network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. Typically, their intention is to steal data rather than to cause
damage to the network or organization. These attacks target organizations in sectors with high-value information,such as national defense, manufacturing, and the financial industry.
What is AV/AM ?
Antivirus & Antimalware , Antivirus is an subset of AM.
What is Attack Signature ?
Indentification File used by OS.
A file containing a data sequence used to identify an attack on the network, typically using an operating system or application vulnerability.
What type attack is .
What is Attack Surface ?
Digital Platform used by attackers to attack .
What is Authentication ?
A file containing a data sequence used to identify an attack on the network, typically using an operating system or application vulnerability.
What is Authentication Token ?
The token is used in addition to or in place of a password for stronger authentication, to prove that the person is who they claim to be.
he server then validates them based on values registered in its credentials database. If the credentials are confirmed, the server responds with an authentication token (which is also kept in the database).
When the same user sends requests to access secured resources in the future, the requests can be authorized with the authentication token, rather than the username and password. The server validates the token against the registered token in the database and grants access. Authentication can be carried out using various types of tokens like OAuth and JSON Web Tokens (JWT).
What is Authorization ?
Authorization is the process of giving someone the ability to access a resource.
A security mechanism used to determine user/client privileges or access levels related to system
resources, including computer programs, files, services, data, and application features. Authorization is normally
preceded by authentication for user identity verification.
What is Baiting ?
The threat actor leaves behind a portable storage device, such as a USB stick, with an enticing label and in a
public area. When the victim inserts the device into their computer, it becomes infected.
What is Behavior Monitoring ?
Observing activities of users, information systems, and processes and measuring the
activities against organizational policies and rule, baselines of normal activity, thresholds, and trends.
What is Bot/Botnet ?
Network of private computers infected with malicious software and controlled as a group without the
owner’s knowledge, and used to perform a DDoS attack, steal data, or send spam. The threat actor controlling a
botnet is sometimes referred to as a “bot-herder”.
What is Breach ?
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its
files and network.
What is BEC ?
Business Email Compromise , Its a type of Social Engineering Attack
List types of Social Engineering & Elaborate?
SpearPhishing , CEO Fraud,whaling,BEC
A form of Social Engineering Attack , attacker somehow redirects a user to phake identical website .
Attack that is targeted to victims who have an existing digital relationship with an online entity such as a bank or retail
website. A spear phishing message is often an e-mail although there are also text message and VoIP spear phishing attacks as well, which looks exactly like a legitimate communication from a trusted entity. The attack tricks the victim into clicking on a hyperlink to visit a company website only to be re-directed to a false version of the website operated
by attackers. The false website will often look and operate similarly to the legitimate site and focus on having the victim provide their logon credentials and potentially other personal identity information such as answers to their security questions, an account number, their social security number, mailing address, email address and/or phone
number. The goal of a spear phishing attack is to steal identity information for the purpose of account takeover or
identity theft.
What is CEO Fraud ?
A form of Social Engineering Attack
(See Spearphishing)
What is Cipher ?
In general term hiding data in some code
a cryptographic algorithm used to encrypt data or information.Some are AES,DES etc
What is Spearphishing ?
Type Social Engineering Attack
What is Clickbait ?
An online advertisement , and whose main purpose is to attract users to another website. Sometimes this website or the advertisement itself contains malware.
What is Credential (or account) harvesting
Targeted attack to steal large number of credentials & emails.
Stealing of Credentials & Emal IDs b targeted attack .
A targeted attack that steals a large number of usernames, passwords, and email addresses.
What is Credential Stuffing ?
Credential stuffing is a cyberattack method in which attackers use lists of compromised user credentials to breach into a system. The attack uses bots for automation and scale and is based on the assumption that many users reuse usernames and passwords across multiple services.