Tools Of The Bad Guys Flashcards

1
Q

What is a data breach?

A

The intentional or unintentional release of secure information to an untrusted environment. Other terms for this are unintentional information disclosure, data leak, and data spill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a DoS attack?

A

Stands for “denial of service” attack. The attackers seek to make a computer or network unavailable to its intended user by temporarily or indefinitely disrupting the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security vulnerability?

A

A weakness on a network computer or software which allows a bad guy to gain access. It has three elements: a flaw, access to the flaw, and capability to exploit the flaw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an exploit?

A

Software or code, usually malicious, that takes advantage of a flaw or vulnerability. The purpose is to cause unintended or unanticipated behavior to occur with the software or Hardware. Such Behavior would be unauthorized access, control of a computer, or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day?

A

The name of a vulnerability unknown to those who would be interested in securing it, which includes the software vendor or user. The bad guys use these vulnerability to launch an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a zero- day exploit?

A

Also known as “zero-day attack” it is an exploit that takes advantage of a zero-day vulnerability on its first day of release before the vendor knows about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an advanced persistent threat?

A

Also known as APT, it is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The bad guy’s goal is to go undetected and steal data rather than cause damage to the network or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

A

Also known as piggybacking, tailgating is a method used by bad guys to gain access to a building or other protected areas. A tailgater waits for an authorized user to open and pass through a secure entry and then follows right behind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a keylogger?

A

Malware or Hardware that observes what someone Types on their keyboard, which is then sent back to the bad guys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Bitcoin?

A

A digital currency in which encryption (the process of converting information or data into a code) techniques are used to regulate the generation of units of currency and verify the transfer funds operating independently of a central bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a money mule?

A

A person recruited by a criminal or criminal organization to quickly receive and turn around funds involved in scams. This person is often unaware of the role in the criminal act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly