Threats, Modules & Injection Attacks Flashcards

1
Q

Threat actors

A

individuals or groups that carry out cyberattacks. They can be motivated by various factors such as financial gain, political agendas, espionage, or simply the challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber criminals

A

(motivated by financial gain), hacktivists (political or social causes, nation state actors (sponsored by governments for espionage or disrupt nation activities), insiders (employees or contractors who misuse access to harm), terrorists (cause fear, harm, or disruption like ISIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TPM - Trusted Platform Module

A

A hardware-based security feature found in many modern computers. It provides a secure environment for storing cryptographic keys, passwords, and other sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HSM - (Hardware Security Module)

A

A dedicated hardware device designed to generate, manage, and store cryptographic keys. HSMs offer robust security by providing a physically isolated environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL injection

A

Attacker inserts malicious SQL code into a query, manipulating a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command injection

A

Attacker executes arbitrary commands on the host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Code injection

A

Attacker injects code that is then executed by the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP injection

A

Attacker manipulates LDAP queries to access or modify data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly