Foundations: Module 2 Flashcards

(31 cards)

1
Q

Phishing

A

Using fake messages to trick people into giving away personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Email Compromise (BEC)?

A

An attacker pretends to be someone from work in an email to fool others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear Phishing?

A

A fake email sent to a specific person to trick them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

A phishing attack targeting important people like company executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Tricking people using phone calls to get private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

Using text messages to trick people into sharing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Software designed to harm devices or networks, often to gain money or intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Viruses

A

Harmful code that spreads when someone clicks a bad link or opens an infected file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

Malware that copies itself and spreads on its own without anyone doing anything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

An attack where hackers lock your data and ask for money to unlock it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Malware that secretly steals and sells your info, like messages and location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

A

A trick that takes advantage of people making mistakes to get access or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Media Phishing

A

Using someone’s social media to collect info and create attacks that feel personal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Watering Hole Attack

A

Hacking websites that certain people often visit to secretly infect their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB Baiting

A

Leaving infected USB drives to trick users into plugging them in, spreading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Social Engineering

A

Pretending to be someone trusted to sneak into secure places.

17
Q

Social Engineering Principles

A

Using tricks like acting important, rushing people, or pretending to be trustworthy to fool someone.

18
Q

Authority

A

Pretending to be someone important to take advantage of how people usually respect authority.

19
Q

Intimidation

A

Using threats or pressure to force victims into compliance.

20
Q

Consensus/Social Proof

A

Tricking people by saying others already went along with it, so it seems real.

21
Q

Scarcity

A

Making something seem rare or urgent so people feel rushed to act fast.

22
Q

Familiarity

A

Faking a personal bond to make someone trust you and let their guard down.

23
Q

Trust

A

Slowly building fake trust with someone to get their private information.

24
Q

Urgency

A

Pushing someone to act fast so they don’t have time to think or ask questions.

25
Adversarial Artificial Intelligence (AI)
Using AI or machine learning to make cyberattacks faster and smarter.
26
CISSP
Certified Information Systems Security Professional? globally recognized cybersecurity certification.
27
Cryptographic Attack
An attack that tries to break or spy on secure messages between two people.
28
Hacker
A person who uses computers to access systems, networks, or data; legally or illegally.
29
Password Attack
Trying to break into systems or data that are locked with a password.
30
Physical Attack
A cyberattack that also affects real-world places or equipment.
31
Supply-Chain Attack
An attack that sneaks in by messing with software or hardware before it reaches the user.