Threats in cybersecurity Flashcards
(44 cards)
Angler phishing:
A technique where attackers impersonate customer service representatives on social media
Advanced persistent threat (APT):
Instances when a threat actor maintains unauthorized access to a system for an extended period of time
Adware:
A type of legitimate software that is sometimes used to display digital advertisements in applications
Attack tree:
A diagram that maps threats to assets
Baiting:
A social engineering tactic that tempts people into compromising their security
Botnet:
A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”
Cross-site scripting (XSS):
An injection attack that inserts code into a vulnerable website or web application
Cryptojacking:
A form of malware that installs software to illegally mine cryptocurrencies
DOM-based XSS attack:
An instance when malicious script exists in the webpage a browser loads
Dropper:
A type of malware that comes packed with malicious code which is delivered and installed onto a target system
Injection attack:
Malicious code inserted into a vulnerable application
Fileless malware:
Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer
Hacker:
Any person or group who uses computers to gain unauthorized access to data
Identity and access management (IAM):
A collection of processes and technologies that helps organizations manage digital identities in their environment
Input validation:
Programming that validates inputs from users and other programs
Intrusion detection system (IDS):
An application that monitors system activity and alerts on possible intrusions
Malware:
Software designed to harm devices or networks
Loader:
A type of malware that downloads strains of malicious code from an external source and installs them onto a target system
Process of Attack Simulation and Threat Analysis (PASTA):
A popular threat modeling framework that’s used across many industries
Phishing kit:
A collection of software tools needed to launch a phishing campaign
Phishing:
he use of digital communications to trick people into revealing sensitive data or deploying malicious software
Prepared statement:
A coding technique that executes SQL statements before passing them onto the database
Potentially unwanted application (PUA):
A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software
Quid pro quo:
A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money