Assets, Threats, and Vulnerabilities: Module 4 Flashcards

(44 cards)

1
Q

Angler Phishing

A

Tricking people on social media by pretending to be customer support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced Persistent Threat (APT)

A

A hacker secretly stays in a system for a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

Software that shows ads inside apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Tree

A

A diagram showing how a hacker might reach a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baiting

A

Tricking someone into doing something risky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A group of infected computers controlled by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross-Site Scripting (XSS)

A

Hacker code added to a website or app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptojacking

A

Malware that uses your computer to mine cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DOM-Based XSS Attack

A

Harmful code already in a webpage you load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dropper

A

Malware that carries and installs other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fileless Malware

A

Malware that hides by using programs already on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacker

A

Someone who breaks into systems or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity and Access Management (IAM)

A

Tools to control who can access what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Injection Attack

A

Bad code added into an app to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Input Validation

A

Checking input to make sure it’s safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intrusion Detection System (IDS)

A

Tool that watches for and warns about attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Loader

A

Malware that brings in more malware from outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A

Software made to harm computers or networks

19
Q

Process of Attack Simulation and Threat Analysis (PASTA)

A

A method for finding and planning for threats

20
Q

Phishing

A

Tricking someone with fake messages to steal info

21
Q

Phishing Kit

A

Tools to help launch a phishing scam

22
Q

Prepared Statement

A

Safe way to send SQL code to a database

23
Q

Potentially Unwanted Application (PUA)

A

Unwanted software that comes with real apps

24
Q

Quid Pro Quo

A

Offering fake rewards to steal info or access

25
Ransomware
Malware that locks files and asks for money
26
Reflected XSS Attack
Harmful code runs when the server replies
27
Rootkit
Malware that gives full control of a computer
28
Scareware
Fake warnings used to scare users into installing malware
29
Smishing
Phishing using text messages
30
Social Engineering
Tricking people to get access or info
31
Spear Phishing
Phishing targeting a specific person or group
32
Spyware
Secret software that collects and sells info
33
SQL
Language to talk to and manage databases
34
SQL Injection
Tricking a database by sending bad SQL code
35
Stored XSS Attack
Harmful code is saved on the server
36
Tailgating
Sneaking into a building by following someone
37
Threat
Something that could cause harm
38
Threat Actor
A person or group that causes security risks
39
Threat Modeling
Finding and understanding possible attacks
40
Trojan Horse
Malware that looks like a real program
41
Vishing
Phishing through phone calls
42
Watering Hole Attack
Hacking a site a group often visits
43
Whaling
Phishing that targets top executives
44
Web-Based Exploits
Code that takes advantage of website flaws