Digital Security Risks Flashcards
(49 cards)
It refers to potential threats and vulnerabilities that could compromise the confidentiality, integrity, or availability of data, systems, or networks.
These risks can stem from various sources, such as malicious attacks, human errors, or software vulnerabilities.
Digital Security Risks
Types of Digital Security Risks
- Malware
- Viruses
- Worms
- Trojan Horses
- Ransomware
- Spyware
- Adware
- Phishing
- Social Engineering
- Data Breaches
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
- Man-in-the-Middle (MitM) Attacks
- Zero-Day Exploits
- Brute Force Attacks
- Insider Threats
Malicious software designed to harm or exploit systems.
Malware
Attaches itself to legitimate software and spreads to other files.
Viruses
Self-replicating malware that spreads without needing a host file.
Worms
Disguised as legitimate software but performs malicious activities.
Trojan Horses
Encrypts a user’s files and demands payment for their release.
Ransomware
Collects sensitive information without the user’s knowledge.
Spyware
Automatically delivers unwanted ads.
Adware
Fraudulent attempts to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising as a trustworthy entity in electronic communications (e.g., email, SMS).
Phishing
Manipulating individuals into divulging confidential or personal information, often through deceptive tactics like posing as a trusted person or authority.
Social Engineering
Unauthorized access to confidential data, which may lead to loss of sensitive information such as personal data, intellectual property, or financial information.
Data Breaches
Overloading a network or server with excessive requests to make it unavailable to legitimate users.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
A hacker intercepts and potentially alters the communication between two parties without their knowledge.
Man-in-the-Middle (MitM) Attacks
Exploiting software vulnerabilities that the software vendor is unaware of or has not yet patched.
Zero-Day Exploits
Attempts to crack passwords or encryption keys by trying all possible combinations.
Brute Force Attacks
Employees or contractors who intentionally or unintentionally compromise the security of an organization from within.
Insider Threats
These are actions carried out by malicious actors intending to disrupt, damage, or gain unauthorized access to computer systems or networks.
Internet and Network Attacks
Common Types of Network Attacks
- Packet Sniffing
- Spoofing
- IP Spoofing
- DNS Spoofing
- SQL Injection
- Cross-Site Scripting (XSS)
- Password Attacks
- Dictionary Attacks
- Rainbow Table Attacks
- Botnets
- Session Hijacking
- DNS Attacks
Intercepting and capturing packets of data as they travel through the network. Tools like Wireshark are used to analyze network traffic.
Packet Sniffing
Pretending to be another entity by falsifying data to gain access to systems or resources.
Spoofing
Modifying the IP address in packets to hide the identity of the attacker.
IP Spoofing
Redirecting traffic to a malicious website by corrupting DNS data.
DNS Spoofing
Inserting malicious SQL queries into web forms to manipulate or retrieve data from a database.
SQL Injection