CYBER CHAPTER 1 Flashcards
(35 cards)
Cat fishing
The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.
Blacklist
Used to refer to a list of banned IP addresses, applications or users
Whitelist
Used to refer to a list of explicitly allowed IP addresses, applications, or users
Authentication
The process of proving an individual is who they claim to be
Threat
This generally refers to anything that has the potential to cause our data, systems and networks harm
Exploit
A clearly defined way to breach the security of a system
Availability
Ensures systems and data are accessible and operational for authorized users when needed
Non-Repudation
Guarantees proof of actions or communications, preventing denial of their occurrence
Data Mining
The activity of analyzing and/or searching through data in order to find items of relevance, significance or value
Vulnerabilities
These are weaknesses within a system or network that can be exploited to cause us harm
Risk
This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist
Zero Day
This is used to describe a threat that is unknown to security specialists and has not been addressed
Hack Value
The perceived worth or challenge of hacking a target, making it attractive to hackers for prestige, curiosity, or potential gain.
Logic Bomb
A malicious code that is only triggered when a set of conditions are met
Obfuscation
A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it
Honey Pot
A decoy or trap for hackers
Spoof
The act of falsifying the identity of the source of a communication or interaction
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to systems
Virus
A type of malware that attaches itself to files and spreads between devices when executed
Trojan (Trojan Horse)
Malicious software disguised as legitimate, granting unauthorized access to systems
Spyware
Software that secretly gathers user information without consent
Adware
Software displaying unwanted advertisements, often bundled with free software
Ransomware
Malware that encrypts files and demands payment for decryption
Phishing
Fraudulent attempts to acquire sensitive information by impersonating trustworthy entities