Security: Identify common security threats and vulnerabilities Flashcards
An email request pretending to be from a financial institution asking for your login information is an example of what?
Phishing
What type of malicious software infects through the internet to collect user information, including browsing habits?
Spyware
Which security threat often uses tracking cookies to collect and report a user’s activities?
Spyware
Which activity is covered under the confidentiality objective of the CIA triad and involves examining someone’s computer to steal confidential information?
Shoulder surfing
____ is when someone piggybacks on your credentials to gain unauthorized entry into a building
Tailgating
_______ occur when live environments become vulnerable and targeted before a fix or patch can be implemented. Occurs when security is breached on the same day an application is released
Zero day attack
_____ occurs when a group of users in an organization become a high risk or target for attacks through email and social media posts.
Spear phishing
_____ is like spear phishing but aimed at senior executives
Whaling
______ is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
Social engineering
A hacker learns an employee’s user name and password by impersonating tech support. What type of attack is this?
Social engineering
What are some common ways a virus infection occurs on a computer?
- Through the internet
- Through email
- Through file sharing
Several employees report their emails were hacked after going to a coffee shop and using their phones there. What kind of attack is this most likely?
Shoulder surfing
Do not enter private data or log in information where someone can see it
What malicious program replicates itself to computers on a network through security loopholes?
Worm
A worm infects a computer by detecting various vulnerabilities, after the computer is infected, the worm attempts to replicate itself by detecting similar vulnerabilities on the network
What malicious software relies on other applications to execute and infect the system?
Virus
The main criterion for classifying a virus is that it spreads via host applications
What is the difference between a logic bomb and a time bomb?
A time bomb occurs on a specified date or time.
A logic bomb occurs when a certain condition is met