Lesson 1 Flashcards
(44 cards)
is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons.
Black-hat Hacker
exploit networks
and computer systems in
the way that black hats
do, but do so without any
malicious intent,
disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies.
Gray Hat
on the other hand, are deemed to be the good guys, working with organizations to strengthen the
security of a system
White Hat
the methods that adversaries use to breach or
infiltrate your network.
Attack Vector
An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.
Advanced Persistent Threats
represented by ALL OF THE POINTS ON YOUR NETWORK where an adversary can
attempt to gain entry to your information systems.
Attack Surface
the methods that adversaries use to BREACH OR
INFILTRATE YOUR NETWORK.
Attack Vector
Major Attack Vectors
Social Engineering
Remote Access
Insider Threats
Brite-Force Attacks
Ransomware
Denial of Service
Access through Intermediaries
Manipulating people into performing actions or divulging confidential information
Social Engineering: Phishing
THROUGH OPEN PORTS or the exploitation of web code, hackers are able to gain unauthorized access to server
Remote Access
Criminals are aided by the conscious assistance of an organization’s employee(s)
Insider Threats
also known as an exhaustive search, is A CRYPTOGRAPHIC HACK THAT RELIES ON GUESSING POSSIBLE COMBINATIONS of a targeted password until the correct password is discovered.
Brute Force attacks
RESTRICTING ACCESS to a computer until A RANSOM IS PAID
Ransomware
a malicious attempt to DISRUPT THE NORMAL TRAFFIC OF A TARGETED SERVER, service or network by
overwhelming the target or its surrounding infrastructure with a flood of
Internet traffic.
Denial of Service
An attack vector that DOESN’T REQUIRE PHYSICAL ACCESS to target machines
Access through Intermediaries
A common, respected model that FORMS THE BASIS FOR THE DEVELOPMENT OF SECURITY SYSTEMS and policy
CIA Triad
Term used for preservation of confidentiality, integrity and availability of information.
Information Security
Defined as the preservation
of confidentiality, integrity and
availability of information in the
Cyberspace.
Cybersecurity
PREVENTS UNAUTHORIZED USE or DISCLOSURE OF INFORMATION
Confidentiality
Safeguards the ACCURACY AND COMPLETENESS of information
Integrity
Authorized users have reliable and timely access to information
Availability
the fundamental sector on which all critical infrastructure depend.
Information technology
An act defining cybercrime, providing for the prevention, investigation, suppression and the imposition of penalties therefore and for other purposes
R.A. 10175
Cybercrime Prevention Act
of 2012
An act protecting individual personal information in information and
communication systems in the government and the private sector,
creating for this purpose a National Privacy Commission, and for
other purposes.
R.A. 10173
Data Privacy Act of 2012