CYBER CHAPTER 1 Flashcards

(35 cards)

1
Q

Cat fishing

A

The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blacklist

A

Used to refer to a list of banned IP addresses, applications or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whitelist

A

Used to refer to a list of explicitly allowed IP addresses, applications, or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

The process of proving an individual is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

This generally refers to anything that has the potential to cause our data, systems and networks harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploit

A

A clearly defined way to breach the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Ensures systems and data are accessible and operational for authorized users when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudation

A

Guarantees proof of actions or communications, preventing denial of their occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Mining

A

The activity of analyzing and/or searching through data in order to find items of relevance, significance or value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerabilities

A

These are weaknesses within a system or network that can be exploited to cause us harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero Day

A

This is used to describe a threat that is unknown to security specialists and has not been addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hack Value

A

The perceived worth or challenge of hacking a target, making it attractive to hackers for prestige, curiosity, or potential gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic Bomb

A

A malicious code that is only triggered when a set of conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Obfuscation

A

A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honey Pot

A

A decoy or trap for hackers

15
Q

Spoof

A

The act of falsifying the identity of the source of a communication or interaction

16
Q

Malware

A

Malicious software designed to disrupt, damage, or gain unauthorized access to systems

17
Q

Virus

A

A type of malware that attaches itself to files and spreads between devices when executed

18
Q

Trojan (Trojan Horse)

A

Malicious software disguised as legitimate, granting unauthorized access to systems

19
Q

Spyware

A

Software that secretly gathers user information without consent

20
Q

Adware

A

Software displaying unwanted advertisements, often bundled with free software

21
Q

Ransomware

A

Malware that encrypts files and demands payment for decryption

22
Q

Phishing

A

Fraudulent attempts to acquire sensitive information by impersonating trustworthy entities

23
Spoofing (Email)
Faking the sender’s email address to deceive recipients
24
Social Engineering
A method of attack where an attacker manipulates people into revealing sensitive information or preforming actions that compromise security, often through deception or psychological manipulation by taking advantage of human nature.
25
Denial of Service Attack (DoS)
An attack designed to make a computer, network, or service unavailable to its intended users by overwhelming it with a flood or traffic or by exploiting vulnerabilities to disrupt its normal opereation.
26
Authorization
Granting users permission to access specific resources or perform specific actions based on their credentials
27
Disclosure
The unauthorized release or exposure of confidential information to unauthorized entities
28
Deniability
The ability to deny involvement in an action or communication, often by obscuring the origin or attribution of an attack or message, making it difficult to prove the party responsible.
29
Accounting
Tracking user actions and resource usage within a system to ensure accountability and traceability
30
Alteration
Modification or tampering of data, potentially impacting its integrity or trustworthiness
33
On-Boarding policy
A set of procedures and security guidelines for integrating new employees, users, or devices into an organization's systems. It ensures proper access control, security configurations, and compliance with cyber-security policies.
34
Tailgating
(also called piggybacking) is a social engineering attack where an unauthorized person gains physical access to a restricted area by following an authorized individual. This often happens when someone holds the door open for them without verifying their credentials.
35