SSC Vocabulary

¡Supera tus tareas y exámenes ahora con Quizwiz!

Data Destruction/Wipe Attack

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives

Bitcoin

Bitcoin was the first cryptocurrency to successfully record transactions on a secure, decentralized blockchain-based network.

CIA Triad

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

Mumble Attack

If the service representative asked to speak with the customer directly, the caller would impersonate a voice-impaired customer, using a mechanical device to distort his voice and make it impossible for the service representative to understand him—a variant of a widely used social-engineering technique known as the "mumble attack."

Data Interception

Refers to the obstruction of data transmission to and from the device, and remotely altering the messages.

Quid Pro Quo Attack

Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login credentials in exchange for a service. For example, an end user might receive a phone call from the hacker who, posed as a technology expert, offers free IT assistance or technology improvements in exchange for login credentials.

Boy Who Cries Wolf Attack

The cries of "Wolf!" about breaches that weren't really breaches seem to be effectively garnering mainstream attention for good security practices

Botnet

They're connected computers performing a number of repetitive tasks to keep websites going. It's most often used in connection with Internet Relay Chat. These types of botnets are entirely legal and even beneficial to maintaining a smooth user experience on the Internet.

Cookies

are small files that Web sites put on your computer hard disk drive when you first visit. Cookies tell us how often you visit pages, which helps us find out what information interests you

Sarbanes Oxley Act

came in response to highly publicized corporate financial scandals earlier that decade. The act created strict new rules for accountants, auditors, and corporate officers and imposed more stringent recordkeeping requirements. The act also added new criminal penalties for violating securities laws.

Worm

can be transmitted via software vulnerabilities. Or computer worms could arrive as attachments in spam emails or instant messages (IMs). Once opened, these files could provide a link to a malicious website or automatically download the computer worm. Once it's installed, the worm silently goes to work and infects the machine without the user's knowledge. They can modify and delete files, and they can even inject additional malicious software onto a computer.

Penetration Testing

colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.

Uniform Resource Locator (URL)

colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

Big Data

extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.

Whaling

is a common cyber attack that occurs when an attacker utilizes spear phishing methods to go after a large, high-profile target, such as the c-suite.

Password Management Software

is a computer program that allows users to store, generate, and manage their personal passwords for online services.

Zero Day Vulnerability

is a computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability (including the vendor of the target software) and is being actively exploited in the wild. Until the vulnerability is mitigated, hackers can continue to exploit it to adversely affect computer programs, data, additional computers or a network.

Block chain

is a distributed ledger technology (DLT) that allows data to be stored globally on thousands of servers - while letting anyone on the network see everyone else's entries in near real-time.

Pretexting

is a form of social engineering in which an individual lies to obtain privileged data. A pretext is a false motive. Pretexting often involves a scam where the liar pretends to need information in order to confirm the identity of the person he is talking to.

Distributed Denial of Service Attack

is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Stuxnet

is a malicious computer worm, targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material.

Scareware

is a malware tactic that manipulates users into believing they need to download or buy malicious, sometimes useless, software. Most often initiated using a pop-up ad, scareware uses social engineering to take advantage of a user's fear, coaxing them into installing fake anti-virus software.

Watering Hole Attack

is a method in which the attacker seeks to compromise a specific group of end users by infecting websites that members of that group are known to visit. The goal is to infect a victim's computer and gain access to the network within the victims's place of employment.

CEO Fraud

is a scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool an employee in accounting or HR into executing unauthorized wire transfers, or sending out confidential tax information.

Dumpster Diving

is a technique used to retrieve information that could be used to carry out an attack on a computer network.

Virus

is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.

Trojan/Trojan Horse

is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.

Ransomware

is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Shoulder Surfing

is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping.

SQL Injection Attack

is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.

Advanced Persistent Threat

is an attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. Advanced persistent threats generally do not cause damage to company networks or local machines.

Denial of Service Attack

is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Man in the Middle Attack

is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

Mining Attack

is an emerging online threat that hides on a computer or mobile device and uses the machine's resources to "mine" forms of online money known as cryptocurrencies.

Virtual Private Network (VPN)

is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.

"Social Engineer Toolkit"

is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

Vishing

is just one form of phishing, which is any type of message — such as an email, text, phone call or direct-chat message — that appears to be from a trusted source, but isn't. The goal is to steal someone's identity or money.

Cryptography

is one of the most important tools for building secure systems. Through the proper use of cryptography, one can ensure the confidentiality of data, protect data from unauthorized modification, and authenticate the source of data.

Data Tampering

is the act of deliberately modifying (destroying, manipulating, or editing) data through unauthorized channels.

Spear Phishing

is the act of sending and emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money.

Keylogging

is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.

Malware

is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.

Phishing

is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication.

Cybersecurity

is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes

Social Engineering

is the psychological manipulation of people into performing actions or divulging confidential information.

Steganography

is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.

Hacktivists/Hactivism

is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.

Adware

is unwanted software designed to throw advertisements up on your screen, most often within a web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program). Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.

Spyware

is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.

Spoofing E-mail address/phone numbers

is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity. Scammers often use neighbor spoofing so it appears that an incoming call is coming from a local number, or spoof a number from a company or a government agency that you may already know and trust.

Smishing

is when someone tries to trick you into giving them your private information via a text or SMS message.

Tailgating/Piggybacking

refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint It can be either electronic or physical.

Drive by Attack

specifically refer to malicious programs that install to your devices — without your consent. This also includes unintentional downloads of any files or bundled software onto a computer device.

Baiting

use a false promise to pique a victim's greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware.


Conjuntos de estudio relacionados

Business 340 International Business

View Set

Ch 17: Small Business Protection: Risk Management and Insurance

View Set

Biomed final Dr. R Van Der Hoeven

View Set

Unit 4 Activity 1 Extension A Quiz

View Set

Physiology Final Exam ( Cumulative)

View Set

Chapter 10 Management and Production

View Set

The CE Shop National Exam (PSI) PART 1

View Set

Welding Carbon and Alloy Steels 2nd Year

View Set