Module 3 Flashcards
(122 cards)
What are the 3 CIA Triad
Confidentiality, Integrity, Availability
Anything of value to the organization. It includes people, equipment, resources, and data
Asset
A weakness in a system, or its design, that could be exploited by a threat
vulnerability
A potential danger to a company’s assets, data, or network functionality
threat
A mechanism that takes advantage of a vulnerability
exploit
Counter-measure that reduces the likelihood or severity of a potential threat or risk.
mitigation
The likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization
risk
A path by which a threat actor can gain access to a server, host, or network.
attack vector
____ or data exfiltration is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world
Data loss
What should be done to confidential data no longer required by a company
shredded
Hackers are also called as ____
threat actors
Ethical hackers who use their programming skills for good, ethical, and legal purposes.
White Hat Hackers
These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage
Gray Hat Hackers
These are unethical criminals who compromise computer and network security for personal gain, or for malicious reasons, such as attacking networks
Black Hat Hackers
These are teenagers or inexperienced hackers running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
Script Kiddies
These are usually gray hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
Vulnerability Broker
These are gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks.
Hacktivists
These are black hat hackers who are either self-employed or working for large cybercrime organizations
Cyber criminals
These are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks. Their targets are foreign governments, terrorist groups, and corporations
State-Sponsored
Penetration Testing Tool which repeatedly make guesses in order to crack the password
Password Crackers
Penetration Testing Tool used to intentionally hack into a wireless network to detect security vulnerabilities.
Wireless Hacking Tools
Tools that are used to probe network devices, servers, and hosts for open TCP or UDP ports.
Network Scanning and Hacking Tools
These tools are used to probe and test a firewall’s robustness using specially crafted forged packets
Packet Crafting Tools
These tools are used to capture and analyze packets within traditional Ethernet LANs or WLANs
Packet Sniffers