Module 2 - Cybersecurity threats , vulnerabilities and attacks Flashcards
(114 cards)
Which term refers to an area of control or protection that attackers can exploit?
A threat domain
What must organizations identify first before implementing effective cybersecurity solutions?
Vulnerabilities within their threat domains
What category includes bugs, application downtime, and illegal file shares?
Software errors
Which type of cyber threat includes DoS attacks and viruses?
Software attacks
What distinguishes internal threats from external ones?
Internal threats originate from current or former employees
Which threat type includes actions like website defacement and database compromise by an insider?
Sabotage
What type of cyber threat does a firewall misconfiguration fall under?
Human error
Which threat category includes the physical theft of devices like laptops?
Theft
Hard drive crashes are an example of which type of threat?
Hardware failures
What kind of cyber threat is caused by power outages or sprinkler system malfunctions?
Utility interruption
What is a typical target of an Advanced Persistent Threat (APT)?
Governments and high-level organizations
What type of malware bypasses authentication and gives attackers admin-level remote access?
Backdoor
What is often considered the weakest link in information security systems?
Users
What tactic is commonly used by external attackers to trick users into providing access?
Social engineering
What domain includes email, database management, and security monitoring systems?
Application domain
Which attack abuses software logic to produce unintended behaviors like false alerts or CPU overloads?
Algorithm attack
Which domain includes employees, customers, and partners with system access?
User domain
Which domain includes all devices connected within the same geographic area, wired or wireless?
Local Area Network (LAN) domain
What physical security risk threatens the LAN domain?
Unauthorized access
Which category of attack uses multiple actors and advanced malware to stay undetected for long periods?
Advanced Persistent Threat (APT)
Why are rootkits extremely difficult to detect?
They modify systems
Which attack on the LAN involves examining open ports to find vulnerabilities?
Unauthorized network probing and port scanning
Which backdoor tools are commonly used to gain unauthorized access?
Netbus and Back Orifice
Which malware modifies the OS to maintain hidden access and escalate privileges?
Rootkit