Module Two Flashcards

(34 cards)

1
Q

Computer Virus

A

malicious code written to interfere with computer ops and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering

A

manipulation technique that exploits human error to gain private info, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

use of digital comms to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BEC

A
  • business email compromise
    threat actor sends an email message that seems to be from a known source to make request for info, in order to obtain financial advantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

malicious email attack that targets specific user or group, email seems to be from trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

threat actor targets company executives to access sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

exploitation of electronic voice comm to obtain sensitive info or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

malware that can duplicate and spread itself across systems on its own
- does not need to be downloaded by user
- self replicates and spreads from infected computer to other devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

malicious attack where threat actors encrypt organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

malware used to gather and sell info without consent
- can be used to access devices, allowing threat actors to collect personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Media Phishing

A

threat actor collects info about target from social media sites, then initiates attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

threat actor attacks website frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

USB baiting

A

threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical social engineering

A

threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering Principles

A
  • authority
  • intimidation
  • consensus/social proof
  • scarcity
  • familiarity
  • trust
  • urgency
17
Q

CISSP Security Domains

A
  • Certified Info Systems Security Professional
  • 8 domains to organize the work of security professionals
18
Q

Security and risk management

A

defines security goals and objectives, risk mitigation, compliance, business continuity, and the law
- ex: updating company policies for private health info due to changes to HIPAA

19
Q

Asset Security

A

secures digital/physical assets, also related to the storage, maintenance, retention, and destruction of data
- ex: proper disposal of old equipment that once housed private data

20
Q

Security architecture and engineering

A

optimizes data security by ensuring effective tools, systems, and processes are in place
- ex: configuring a firewall

21
Q

Communication and Network Security

A

manage and secure physical networks and wireless comms
- ex: analyze user activity within org

22
Q

Identity and access management

A

keeps data secure by ensuring users follow est policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications
- ex: setting up employee keycard access

23
Q

Security assessment and testing

A

conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities
- ex: conducting audit of user permissions to ensure correct level of access

24
Q

Security operations

A

conducting investigations and implementing preventative measures
- ex: you receive an alert that an unknown device has connected to your internal network, and have to follow est procedure to stop potential threat

25
Software Development Security
uses secure coding practices, which are a set of recommended guidelines to create secure apps and services - ex: advise on password policies for a new app in development
26
Password attack
attempt to access password-secured devices, systems, networks, or data fall under communication and network security domain
27
Physical attack
incident that affects not only digital but also physical environments where the incident is deployed - malicious USB cable, flash drive, card cloning and skimming
28
Adversarial artificial intelligence
technique that manipulates ai and machine learning tech to conduct attacks more efficiently - falls under comm/network security and the identity and access management domains
29
supply-chain attack
targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed - falls under: security and risk management, security architecture and engineering, and security ops domains
30
Cryptographic attack
affects secure forms of comm between sender and intended recipient - forms: birthday, collision, downgrade - falls under comm and network security domain
31
advanced persistent threats
have significant expertise accessing orgs network without authorization - tend to research targets in advance - motives: damaging critical infrastructure, gaining access to IP
32
Insider Threats
abuse their authorized access to obtain data that nay harm an org - motives: sabotage, corruption, espionage, unauthorized data access or leaks
33
Hacktivists
driven by political agenda -motives: demonstrations, propaganda, social change campaigns, fame
34
hacker
person who uses computers to gain access to computer systems, networks, or data - ethical hackers, semi-authorized (research for vulnerabilities), unethical/unauthorized