Threats, Modules & Injection Attacks Flashcards
Threat actors
individuals or groups that carry out cyberattacks. They can be motivated by various factors such as financial gain, political agendas, espionage, or simply the challenge.
Cyber criminals
(motivated by financial gain), hacktivists (political or social causes, nation state actors (sponsored by governments for espionage or disrupt nation activities), insiders (employees or contractors who misuse access to harm), terrorists (cause fear, harm, or disruption like ISIS)
TPM - Trusted Platform Module
A hardware-based security feature found in many modern computers. It provides a secure environment for storing cryptographic keys, passwords, and other sensitive data
HSM - (Hardware Security Module)
A dedicated hardware device designed to generate, manage, and store cryptographic keys. HSMs offer robust security by providing a physically isolated environment
SQL injection
Attacker inserts malicious SQL code into a query, manipulating a database.
Command injection
Attacker executes arbitrary commands on the host operating system.
Code injection
Attacker injects code that is then executed by the application.
LDAP injection
Attacker manipulates LDAP queries to access or modify data.