Week 2 Flashcards

(20 cards)

1
Q

Malware

A

A software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Type of malware that threat actors encrypt data and demand payment to restore them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Malicious software installed on computer without permission to spy on or steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Use of digital communication to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear phishing

A

Malicious email attack targeting specific users that appears to originated from trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of spear phishing targeting executives to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business email compromise (BEC)

A

An attack in which threat impersonates a known sorce to obtain a financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

Exploitation of voice electronic communication to obtain sensitive information or to impersonate a known sorce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

Manipulation technique that exploits human error to gain unauthorised access to sensitive, private and/or valuable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social media phishing

A

An attack in which detailed information about target is collected on social media sites before initiating attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

Compromising website that is frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical social engineering

A

An attack in which threat actor impersonates an employee, customer, or vender to obtain unauthorised access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB baiting

A

A malware USB stick is strategically left for an employee to find and unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

8 Security Domains

A
  1. Security and risk management
  2. Asset security
  3. Security architecture and engineering
  4. Communication and network security
  5. Identity and access management
  6. Security assessment and testing
  7. Security operations
  8. Software development security
17
Q

Security and Risk Management

A

Defining security goals and objectives, risk mitigation, compliance, business continuity and law

18
Q

Asset Security

A

Securing digital and physical assets - storage, maintenance, retention, and destruction of data

19
Q

Security architecture and engineering

A

Optimising data security by ensuring effective tools, systems, and processes are in place
E.g. configuring firewall

20
Q

Communication and Network Security

A

Managing and securing physical networks and wireless