Tools of the Bad Guys Flashcards

1
Q

Data Breach

A

The intentional or unintentional release of secure information to an untrusted environment.

Data leak, and data spill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS Attack:

A

Stands for “denial-of-service attack” the attackers seek to make a computer or network unavailable to its intended user(s), by temporarily or indefinitely disrupting service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Vulnerability

A

A weakness on a network, computer, or software which allows a bad guy to gain access.

A security vulnerability has (3) elements:

  1. A flaw
  2. Access to the flaw
  3. Capability to exploit that flaw
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploit

A

Software or code-usually malicious-that takes advantage of a flaw or vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero-day

A

The name of a vulnerability unknown to those who would be interested in securing it, which includes the software vendor or user (good guys).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero-Day Exploit

A

Also known as “zero-day attack,” is an exploit that takes advantage of a zero-day vulnerability on it’s first day of release, before vendors knows about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Persistent Test
(APT)

A

Also known as APT, is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The bad guys goal is to go undetected and steal data, rather than cause damage to the network or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tailgating

A

Also know a piggybacking, tailgating is a method used by bad guys to gain access to a building or other protected areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Malware or hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bitcoin

A

A digital currency in which encryption (the process of converting Information or data into a code) techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Money Mule

A

A person recruited by a criminal or criminal organization to quickly receive and turnaround funds involved in scams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly