Introduction to Cyber Security - Unit 2.1 and Unit 2.2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

denial-of-service (DoS) attack

Preventing a target from fulfilling its intended function, typically by keeping the target busy or causing it to crash.

Search Engine Optimization

(SEO) Involves designing websites with the intention of helping search engines best. It is a set of techniques used to improve a website's ranking by a search engine.

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Viruses can also be programmed to mutate to avoid detection

Bot

A program that can do things without the user of the computer having to give it instructions. Many bots are malware as they are installed without people's permission and can be controlled over the internet and used to send spam or steal data. Also known as web robots.

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Advanced Persistent Threats (APTs)

Any sophisticated series of related attacks taking place over an extended period of time. An APT targets organizations or nations for business or political reasons.

Botnets

Bad bots perform malicious tasks allowing an attacker to take complete control over an affected computer for the criminal to control remotely.

DDoS

Denial of service attack committed using dozens of computers, usually zombies on a botnet.

Brute-force attacks

Exhausts all possible password combinations to break into an account

Worms

Independent computer programs that copy themselves from one computer to other computers over a network. Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in networks. Worms usually slow down networks.

Network Sniffing

Intercepting packages on a wireless or wired network and viewing the contents of these packages to decipher passwords or other sensitive information

Man-in-the-middle (MITM) attack

MitM allows the attacker to take control over a device without the user's knowledge. MitM attacks are widely used to steal financial information.

SEO

Search Engine Optimization

Tailgating

The act of unauthorized individuals entering a restricted-access building by following an authorized user.

social engineering attack

The attacker manipulates a person who knows the password into providing it.

Scareware

This is a type of malware designed to persuade the user to take a specific action based on fear. Scareware forges pop-up windows that resemble operating system dialogue windows.

Something for Something (Quid pro quo)

This is when an attacker requests personal information from a party in exchange for something, like a free gift.

Ransomware

This malware is designed to hold a computer system or the data it contains captive until a payment is made

Spyware

This malware is designed to track and spy on the user.

Zombie networks

Virus-infected computer hosts. The zombies are controlled by handler systems.

overwhelming quantity of traffic

a DoS attack in which an enormous number of packets are sent to a network at a rate that the network systems cannot handle. This results in a slowdown of network transmission or response, or the crash of a device or service.

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

non-validated input

a vulnerability in which data supplied to a program by a user or exploit causes the application to behave in an unintended way

man-in-the-mobile (MitMO)

an attack that is a variation of (MitM). A mobile device is infected with malware that takes control of the device and causes it to forward sensitive information to attackers.

software vulnerabilities

an error in the specification, development or configuration of software such that its execution can violate the security policy

Trojan Horse Virus

hides inside other software, usually as an attachment or a downloadable file. A Trojan horse differs from a virus because it binds itself to non-executable files.

Access-control problems

improper use of practices that manage physical control of equipment, data, or applications

Pretexting

occurs when someone improperly accesses your personal information by posing as someone who needs data for one reason or another

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer

hardware vulnerabilities

security weaknesses caused by design flaws in computer devices and components. They are usually limited to specific device models and are commonly exploited through targeted attacks.

Adware

software that automatically displays or downloads advertising material (often unwanted) when a user is online.

blended attack

the use of multiple computer attack techniques to compromise a target

maliciously formatted packets

the use of network data structures that have been created to disrupt the operation of network devices

impact reduction

the use of techniques to limit the damage caused by a successful attack. These techniques include ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks.

Vulnerability Exploitation

the use of various methods, including software tools or social engineering, to gain information about a system. This attacker uses this information to find weaknesses that exist in that specific system.

Race conditions

when the required ordered or timed events do not occur in the correct order or proper timing


Set pelajaran terkait

Biology: God's Living Creation ch. 8

View Set

ATI Funds Proctor Adaptive Quizzes

View Set

Diet therapy of clinical nutrition Final exam Module 1-5 ( understanding normal and clinical nutrition, tenth edition)

View Set

Chapter 32: Drug Therapy to Decrease Histamine Effects and Allergic Response

View Set

NASM 7th ed, Chapter 7: Human Movement Science

View Set