Week 2 Flashcards
(20 cards)
Malware
A software designed to harm devices or networks
Virus
A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data
Worm
Malware that self-replicates, spreading across the network and infecting computers
Ransomware
Type of malware that threat actors encrypt data and demand payment to restore them
Spyware
Malicious software installed on computer without permission to spy on or steal user data
Phishing
Use of digital communication to trick people into revealing sensitive data or deploying malicious software
Spear phishing
Malicious email attack targeting specific users that appears to originated from trusted source
Whaling
A form of spear phishing targeting executives to gain access to sensitive data
Business email compromise (BEC)
An attack in which threat impersonates a known sorce to obtain a financial advantage
Vishing
Exploitation of voice electronic communication to obtain sensitive information or to impersonate a known sorce
Social engineering
Manipulation technique that exploits human error to gain unauthorised access to sensitive, private and/or valuable data
Social media phishing
An attack in which detailed information about target is collected on social media sites before initiating attack
Watering hole attack
Compromising website that is frequently visited by a specific group of users
Physical social engineering
An attack in which threat actor impersonates an employee, customer, or vender to obtain unauthorised access to a physical location
USB baiting
A malware USB stick is strategically left for an employee to find and unknowingly infect a network
8 Security Domains
- Security and risk management
- Asset security
- Security architecture and engineering
- Communication and network security
- Identity and access management
- Security assessment and testing
- Security operations
- Software development security
Security and Risk Management
Defining security goals and objectives, risk mitigation, compliance, business continuity and law
Asset Security
Securing digital and physical assets - storage, maintenance, retention, and destruction of data
Security architecture and engineering
Optimising data security by ensuring effective tools, systems, and processes are in place
E.g. configuring firewall
Communication and Network Security
Managing and securing physical networks and wireless