CYber systems Flashcards
cert (14 cards)
Snooping
Attempting to secretively discover private information about a person, company, or other entity.
Wiretapping
A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
Social Engineering
The use of deception to gain personal and/or private information for unlawful purposes.
Reconnaissance
The passive gathering of information about a potential victim.
Pretexting
Tricking a victim into revealing sensitive information under false pretenses.
Email Attack
Exploiting a victim using email messages.
Browser Attack
Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
Man-in-the-Middle Attack
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Replay Attack
An attempt to connect to a server by capturing and resending authentication information.
Impersonation
TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
Denial of Service
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
Malware
Software designed to infiltrate or damage a computer system without the ownerโs consent or knowledge.
Password Attack
An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
Identify Theft
An occurrence in which thieves steal other peopleโs personal and financial information for their own personal gain.