Threats in cybersecurity Flashcards

1
Q

Angler phishing:

A

A technique where attackers impersonate customer service representatives on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced persistent threat (APT):

A

Instances when a threat actor maintains unauthorized access to a system for an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware:

A

A type of legitimate software that is sometimes used to display digital advertisements in applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack tree:

A

A diagram that maps threats to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baiting:

A

A social engineering tactic that tempts people into compromising their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnet:

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-site scripting (XSS):

A

An injection attack that inserts code into a vulnerable website or web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptojacking:

A

A form of malware that installs software to illegally mine cryptocurrencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DOM-based XSS attack:

A

An instance when malicious script exists in the webpage a browser loads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dropper:

A

A type of malware that comes packed with malicious code which is delivered and installed onto a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Injection attack:

A

Malicious code inserted into a vulnerable application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless malware:

A

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker:

A

Any person or group who uses computers to gain unauthorized access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity and access management (IAM):

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Input validation:

A

Programming that validates inputs from users and other programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion detection system (IDS):

A

An application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware:

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Loader:

A

A type of malware that downloads strains of malicious code from an external source and installs them onto a target system

13
Q

Process of Attack Simulation and Threat Analysis (PASTA):

A

A popular threat modeling framework that’s used across many industries

14
Q

Phishing kit:

A

A collection of software tools needed to launch a phishing campaign

14
Q

Phishing:

A

he use of digital communications to trick people into revealing sensitive data or deploying malicious software

15
Q

Prepared statement:

A

A coding technique that executes SQL statements before passing them onto the database

16
Q

Potentially unwanted application (PUA):

A

A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software

17
Q

Quid pro quo:

A

A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money

18
Q

Ransomware:

A

Type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access

19
Q

Reflected XSS attack:

A

An instance when malicious script is sent to a server and activated during the server’s response

20
Q

Rootkit:

A

Malware that provides remote, administrative access to a computer

21
Q

Scareware:

A

Malware that employs tactics to frighten users into infecting their device

21
Q

Smishing:

A

The use of text messages to trick users to obtain sensitive information or to impersonate a known source

22
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

23
Q

Spear phishing:

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

24
Q

Spyware:

A

Malware that’s used to gather and sell information without consent

25
Q

SQL (Structured Query Language):

A

A programming language used to create, interact with, and request information from a database

26
Q

SQL injection:

A

An attack that executes unexpected queries on a database

27
Q

Stored XSS attack:

A

An instance when malicious script is injected directly on the server

28
Q

Threat:

A

Any circumstance or event that can negatively impact assets

28
Q

Tailgating:

A

A social engineering tactic in which unauthorized people follow an authorized person into a restricted area

29
Q

Threat actor:

A

Any person or group who presents a security risk

30
Q

Threat modeling:

A

The process of identifying assets, their vulnerabilities, and how each is exposed to threats

31
Q

Trojan horse:

A

Malware that looks like a legitimate file or program

32
Q

Vishing:

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

33
Q

Watering hole attack:

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

34
Q

Whaling:

A

A category of spear phishing attempts that are aimed at high-ranking executives in an organization

35
Q

Web-based exploits:

A

Malicious code or behavior that’s used to take advantage of coding flaws in a web application