Chapter 2 Flashcards
(108 cards)
Threat Actor
An entity responsible for an event that impacts safety, such as a malicious hacker, insider, or nation-state.
Advanced Persistent Threat (APT)
A sophisticated, continuous cyberattack typically orchestrated by nation-states, targeting specific data or infrastructure.
Hacktivist
An individual or group that uses hacking to promote a political or social agenda.
Shadow IT
Technology used within an organization without the knowledge or approval of the IT department.
Threat Vector
The method or pathway used by a threat actor to gain access to a target system.
Attack Vector
The specific technique or method used to exploit a vulnerability.
Insider Threat
A security risk that originates from people within the organization.
Script Kiddie
An individual with limited technical skills who uses existing tools to conduct attacks.
Zero-Day Exploit
An attack that exploits a previously unknown vulnerability before a patch is available.
Ransomware
Malicious software that encrypts files and demands payment for decryption.
Phishing
A social engineering attack that uses fraudulent emails to steal sensitive information.
Spear Phishing
A targeted phishing attack directed at specific individuals or organizations.
Whaling
A phishing attack specifically targeting high-profile individuals like executives.
Vishing
Voice phishing conducted over the phone to extract sensitive information.
Smishing
SMS-based phishing attacks using text messages.
Pretexting
Creating a fabricated scenario to engage a victim and steal information.
Baiting
Offering something enticing to spark curiosity and prompt unsafe actions.
Quid Pro Quo
Offering a service or benefit in exchange for information or access.
Tailgating
Following an authorized person into a restricted area without permission.
Shoulder Surfing
Observing someone’s screen or keypad to gather sensitive information.
Dumpster Diving
Searching through discarded materials to find sensitive information.
Watering Hole Attack
Compromising websites frequently visited by a target group.
Business Email Compromise (BEC)
A sophisticated scam targeting businesses working with foreign suppliers or regularly performing wire transfers.
Typosquatting
Registering domains with common misspellings of legitimate sites to deceive users.