Week 1 Flashcards
CIA
Conformation, Integrity, and Availability
Integrity
Keeping data accurate and untampered with
Confidentiality
Keep data hidden. Only need to know basis for files.
Availability
The information we have is readily accessible to those people that should have it
Risk
The possibility of suffering a loss in the event of an attack on the system
Vulnerability
A flaw in the system that could be exploited to compromise the system
0-day vulnerability (zero day)
A vulnerability that is not known to the software developer or vendor, but is known to an attacker
Exploit
Software that is used to take advantage of a security bug or vulnerability
Threat
The possibility of danger that could exploit a vulnerability
Hacker
Someone who attempts to break into or exploit a system
Attack
An actual attempt at causing harm to a system
Black hat hacker
Someone who exploits an vulnerability in a system for malicious purposes
White hat hacker
Someone who exploits an vulnerability in a system to alert the devs so they can fix it before someone tries to exploit it.
Malware
A type of malicious software that can be used to obtain your sensitive information, or delete or modify files
Common types of malware
Viruses, worms, adware, spyware, Trojans, root kids, backdoors, botnets
Adware
Software that displays advertisements and collects data
Trojan
Malware that disguises itself as one thing but does something else
Spyware
Malware meant to spy on you
Keylogger
Common type of spy ware that’s used to record every keystroke you make
Ransomware
Type of attack that holds your data or system hostage until you pay some sort of ransom
Botnets
Designed to utilize the power of the internet connected machines to perform some distributed function
Backdoor
A way to get into a system if the other methods to get into the system aren’t allowed
Rootkit
A collection of software or tools that an Admin would use
Logic bomb
Type of malware that’s intentionally installed