Drill #4 Flashcards
data breach:
release of secure information to an un-trusted environment.
DoS attack:
Stands for “denial-of-service attack.”
disrupting computer or network by flooding system with unnecessary service requests, which overload the system.
security vulnerability:
A weakness on a network, computer which can be exploited by hackers.
A security vulnerability has three elements: a flaw, access to the flaw, and capability to exploit that flaw.
exploit
code that takes advantage of a flaw or vulnerability to cause unintended behavior to occur with the software or hardware.
zero-day:
The name of a vulnerability unknown to those who would be interested in securing it, which includes the software vendor or user (good guys).
zero-day exploit:
Also known as “zero-day attack,” is an exploit that takes advantage of a zero-day vulnerability on its first day of release, before the vendor knows about it.
advanced persistent threat:
network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
Stealing data, rather than causing damage to the network or organization.
tailgating
A tailgater waits for an authorized user to open and pass through a secure entry and then follows right behind to gain access to a building or other protected areas
keylogger
Malware or hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.
Bitcoin
A digital currency in which encryption (the process of converting information or data into a code) techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.
money mule:
A person recruited by a criminal or criminal organization to quickly receive and turnaround funds involved in scams. The person is often unaware of their role in the criminal act.