Security+ Flashcards
(298 cards)
Phishing
Social engineering email trying to spoof users into entering in credentials.
Typosquatting
Attackers slightly changing the URL to make it look legit.
Ex - www.googe.com instead of www.google.com
Pharming
Occurs when an attacker redirects one website’s traffic to another
website that is bogus or malicious
Vishing
(voice phishing) Phone call to you
Smishing
SMS phishing, text message to you.
Spear Phishing
targeted phishing with prior reconnaissance done.
Impersonation
attackers impersonate or make up a story to gain your trust or attention.
Ex. “This is Jim calling from Microsoft Support, we need you to call us because there are issues with your computer”.
Dumpster Diving
Physical dumpster diving by an attacker, sifting through trash to get information from things that may have been thrown out.
Shoulder Surfing
Physically looking over someone’s shoulder, looking at your computer and gaining information.
Hoax
A fake situation that is designed to fool your users into thinking its real.
Watering Hole Attacks
Attackers target a third party site that you or your users use. They then attack that site, and thus gain access to your information or user’s information.
Ex. Attacking Vanta and redirecting their DNS to a spoofed site
Influence Campaigns
Attackers advertise online or post propaganda to influence the opinions of others
Ex - Political campaigns involving falsehoods.
Tailgating
Attacker physically follows you inside the building using your credentials.
Invoice Scams
Attacker sends an email with a fake invoice to the user who pays invoices.
Credential Harvesting
Malware software that extracts credentials stored on your local machine and sends them in an email to an attacker.
Botnet
Group of machines that have the same malware on them. Attackers can execute bulk actions on all machines inside the botnet.
Bot
Single host in a botnet
Virus
Needs human intervention to run, can replicate itself
Worms
No human intervention, uses vulnerabilities in the OS or apps installed to move itself from system to system. Usually resolved via firewall rules, which stops the network transmission to other hosts.
Ransomware
encryption of data, ransom has to be met in order for data to be decrypted.
Crypto-malware
Encrypts all data on a machine and only decrypts and restores it using a proper key. This is the underlying technique behind ransomware attacks.
Trojan
Software that pretends to be something else, you run it and it turns out to be malware. Designed to be non-threatening to standard AV and other common types of defenses.
PUP (Potentially Unwanted Program)
Not malicious in character but bothersome and hard to remove.
Ex - an add toolbar within your web browser.
Backdoor
Malware creates a backdoor, or new way of gaining access to your system for easy access in the future. Other malware can use this new backdoor to infect your system, as it now opened a new vulnerability.