Threats attacks vulnerability Flashcards

1
Q

Eliciting information

A

the act of drawing out or calling forth information or a response. It can be used in a variety of contexts, including social work, questioning, and social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prepending

A

the technique where malicious characters or code are added at the beginning of a legitimate file, string, or command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Invoice scams

A

a type of phishing scam that involve sending an invoice or bill to an individual or company to request payment for goods or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity fraud

A

when someone tries to steal and use your personally identifiable information to defraud or harm you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Credential harvesting

A

is a cyberattack technique that involves stealing personal or financial data from users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reconnaissance

A

a critical phase in the cyber attack lifecycle where threat actors gather information about potential targets and vulnerabilities to help them find attack paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hoax

A

take the form of false virus alerts (such as the “Good Times” hoax), chain letters, or attempts to spread false information about some issue (such as warnings that the Federal Government is about to tax e-mail).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impersonation

A

is an act of fraudulently or dishonestly making use of the electronic signature, password or any other unique identification feature of any other person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hybrid warfare

A

combine military and non-military as well as covert and overt means, including disinformation, cyber attacks, economic pressure, deployment of irregular armed groups and use of regular forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authority

A

is the process of giving a user permission to access a resource, such as a document, application, website, or physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intimidation

A

when a social engineer attempts to intimidate a victim by trying to appear superior to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Consensus

A

when a social engineer convinces victims they can be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scarcity

A

a psychological manipulation technique that uses scarcity to create a false sense of urgency and make a victim feel they must act quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Familiarity

A

when a social engineer attempts to use charisma or likeability to get a victim to complete a request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trust

A

the phrase used to describe the many actions involved when an individual or group engages in lying and using technology to manipulate trust relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Urgency

A

make victims act quickly without noticing suspicious signs.

16
Q

State actors

A

government-affiliated hackers or other groups that are funded or directed by a nation-state to conduct malicious cyber activities.

17
Q

Hacktivists

A

the use of cyber space to perform hacking activities to achieve social or political goals

18
Q

Criminal syndicates

A

Cybercriminal groups are made up of hackers, developers, and other tech professionals who work together to carry out large-scale online heists.

19
Q

Advanced persistent threat (APT)

A

a covert cyber attack on a computer network where the attacker gains and maintains unauthorized access to the targeted network and remains undetected for a significant period.

19
Q

Insider threats

A

a cyber security risk that originates from within an organization. It typically occurs when a current or former employee, contractor, vendor or partner with legitimate user credentials m