Tools of the Bad Guys Flashcards
Data Breach
The intentional or unintentional release of secure information to an untrusted environment.
Data leak, and data spill.
DoS Attack:
Stands for “denial-of-service attack” the attackers seek to make a computer or network unavailable to its intended user(s), by temporarily or indefinitely disrupting service.
Security Vulnerability
A weakness on a network, computer, or software which allows a bad guy to gain access.
A security vulnerability has (3) elements:
- A flaw
- Access to the flaw
- Capability to exploit that flaw
Exploit
Software or code-usually malicious-that takes advantage of a flaw or vulnerability.
Zero-day
The name of a vulnerability unknown to those who would be interested in securing it, which includes the software vendor or user (good guys).
Zero-Day Exploit
Also known as “zero-day attack,” is an exploit that takes advantage of a zero-day vulnerability on it’s first day of release, before vendors knows about it.
Advanced Persistent Test
(APT)
Also known as APT, is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The bad guys goal is to go undetected and steal data, rather than cause damage to the network or organization.
Tailgating
Also know a piggybacking, tailgating is a method used by bad guys to gain access to a building or other protected areas.
Keylogger
Malware or hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.
Bitcoin
A digital currency in which encryption (the process of converting Information or data into a code) techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.
Money Mule
A person recruited by a criminal or criminal organization to quickly receive and turnaround funds involved in scams.