Assets, Threats, and Vulnerabilities: Module 4 Flashcards
(44 cards)
Angler Phishing
Tricking people on social media by pretending to be customer support
Advanced Persistent Threat (APT)
A hacker secretly stays in a system for a long time
Adware
Software that shows ads inside apps
Attack Tree
A diagram showing how a hacker might reach a target
Baiting
Tricking someone into doing something risky
Botnet
A group of infected computers controlled by a hacker
Cross-Site Scripting (XSS)
Hacker code added to a website or app
Cryptojacking
Malware that uses your computer to mine cryptocurrency
DOM-Based XSS Attack
Harmful code already in a webpage you load
Dropper
Malware that carries and installs other malware
Fileless Malware
Malware that hides by using programs already on your computer
Hacker
Someone who breaks into systems or data
Identity and Access Management (IAM)
Tools to control who can access what
Injection Attack
Bad code added into an app to cause harm
Input Validation
Checking input to make sure it’s safe
Intrusion Detection System (IDS)
Tool that watches for and warns about attacks
Loader
Malware that brings in more malware from outside
Malware
Software made to harm computers or networks
Process of Attack Simulation and Threat Analysis (PASTA)
A method for finding and planning for threats
Phishing
Tricking someone with fake messages to steal info
Phishing Kit
Tools to help launch a phishing scam
Prepared Statement
Safe way to send SQL code to a database
Potentially Unwanted Application (PUA)
Unwanted software that comes with real apps
Quid Pro Quo
Offering fake rewards to steal info or access