Testout Security Pro Chapter 2 - Threats, Attacks, and Vulnerabilities

studied byStudied by 1 person
5.0(1)
get a hint
hint

Targeted attack

1 / 64

Tags & Description

Notecards for Testout Security Pro Chapter 2 - Threats, Attacks, and Vulnerabilities, 2023.

Studying Progress

0%
New cards
65
Still learning
0
Almost done
0
Mastered
0
65 Terms
1
New cards

Targeted attack

A type of threat in which threat actors actively pursue and compromise a target entity's infrastructure while maintaining anonymity

New cards
2
New cards

Opportunistic attack

An attack in which the threat actor is almost always trying to make money as fast as possible and with minimal effort

New cards
3
New cards

Insider

A threat agent who has authorized access to an organization and either intentionally or unintentionally carries out an attack

New cards
4
New cards

Competitor

A threat agent who carries out attacks on behalf of an organization and targets competing companies

New cards
5
New cards

Hacker

Any threat agent who uses technical knowledge to bypass security, exploit a vulnerability, and gain access to protected information

New cards
6
New cards

Cybercriminal

A subcategory of hacker threat agents. They are willing to take more risks and use more extreme tactics for financial gain

New cards
7
New cards

Nation state

A sovereign state threat agent that may wage an all-out war on a target and have significant resources for the attack

New cards
8
New cards

Internal threat

A threat from authorized individuals (insiders) who exploit assigned privileges and inside information to carry out an attack

New cards
9
New cards

External threat

A threat from individuals or groups not associated with the organization, who seek to gain unauthorized access to data

New cards
10
New cards

Persistent threat

A threat that seeks to gain access to a network and remain there undetected

New cards
11
New cards

Non-persistent threat

A threat that focuses on getting into a system and stealing information. It is usually a one-time event, so the attacker is not concerned with detection

New cards
12
New cards

Open-source intelligence (OSINT)

Information that is readily available to the public and doesn't require any type of malicious activity to obtain

New cards
13
New cards

White hat

A skilled hacker who uses skills and knowledge for defensive purposes only. This hacker interacts only with systems for which express access permission is given

New cards
14
New cards

Black hat

A skilled hacker who uses skills and knowledge for illegal or malicious purposes

New cards
15
New cards

Gray hat

A skilled hacker who falls in the middle of white hat and black hat hackers. They may cross the line of what is ethical, but usually has good intentions and isn't malicious like a black hat hacker

New cards
16
New cards

Malware

Software designed to take over or damage a computer without the user's knowledge or approval

New cards
17
New cards

Virus

A program that attempts to damage a computer system and replicate itself to other computer systems

New cards
18
New cards

Worm

A self-replicating malware program

New cards
19
New cards

Trojan horse

A malicious program that is disguised as legitimate or desirable software

New cards
20
New cards

Zombie

A computer that is infected with malware and is controlled by a command and control center called a zombie master

New cards
21
New cards

Botnet

A group of zombie computers that are commanded from a central control infrastructure

New cards
22
New cards

Rootkit

A set of programs that allows attackers to maintain hidden, administrator-level access to a computer

New cards
23
New cards

Logic bomb

Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met

New cards
24
New cards

Spyware

Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer

New cards
25
New cards

Adware

Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences

New cards
26
New cards

Ransomware

Malware that denies access to a computer system until the user pays a ransom

New cards
27
New cards

Scareware

A scam to fool a user into thinking there is some form of malware on the system

New cards
28
New cards

Crimeware

Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers

New cards
29
New cards

Crypto-malware

Ransomware that encrypts files until a ransom is paid

New cards
30
New cards

Remote access Trojan (RAT)

Malware that includes a back door to allow a hacker administrative control over the target computer

New cards
31
New cards

Hacker

A person who commits crimes through gaining unauthorized access to computer systems

New cards
32
New cards

Cracker

A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures

New cards
33
New cards

Script kiddy

A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses

New cards
34
New cards

Potentially unwanted program (PUP)

…is a software inadvertently installed that contains adware, installs toolbars, or has other objectives

New cards
35
New cards

Fileless virus

…uses legitimate programs to infect a computer

New cards
36
New cards

Social engineering

An attack involving human interaction to obtain information or access

New cards
37
New cards

Footprinting

Uses social engineering to obtain as much information as possible about an organization

New cards
38
New cards

Pretexting

A fictitious scenario to persuade someone to perform an action or give information

New cards
39
New cards

Elicitation

A technique to extract information from a target without arousing suspicion

New cards
40
New cards

Preloading

Influencing a target thoughts, opinions, and emotions before something happens

New cards
41
New cards

SMiShing

Doing phishing through an SMS message. Tricking a user to download a virus, Trojan horse, or malware onto a cell phone

New cards
42
New cards

Impersonation

Pretending to be somebody else and approaching a target to extract information

New cards
43
New cards

SPIM

…is similar to spam, but the malicious link is sent to the target over instant messaging instead of email

New cards
44
New cards

Hoax

A type of malicious email with some type of urgent or alarming message to deceive the target

New cards
45
New cards

Hacktivist

A hacker with a political motive

New cards
46
New cards

Ignorance

…means the target is not educated in social engineering tactics and prevention, so the target doesn't recognize social engineering when it is happening

New cards
47
New cards

Shoulder surfing

Looking over someone's shoulder while that person works on a computer or reviews documents

New cards
48
New cards

Eavesdropping

An unauthorized person listening to private conversations between employees or other authorized personnel when sensitive topics are being discussed

New cards
49
New cards

Keyloggers

A device used to steal data through by capturing what the user types

New cards
50
New cards

Feigning ignorance

Make a wrong statement and then admit to not knowing much about the subject in hopes the target will reveal the needed information

New cards
51
New cards

Spear phishing

Gathers information about the victim, such as the online bank

New cards
52
New cards

Whaling

…is another form of phishing. It targets senior executives and high-profile victims

New cards
53
New cards

Vishing

…is like phishing, but instead of an email, the attacker uses Voice over IP (VoIP) to gain sensitive information. The term is a combination of voice and phishing

New cards
54
New cards

Pharming

Executing malicious programs on the target's computer so that any URL traffic redirects to the attacker's malicious website

New cards
55
New cards

Social networking

Many attackers are turning to applications such as Facebook, Twitter, Instagram, to steal identities and information. Also, many attackers use social media to scam users. These scams are designed to entice the user to click a link that brings up a malicious site the attacker controls. Usually, the site requests personal information and sensitive data, such as an email address or credit card number

New cards
56
New cards

Zero-day vulnerability

…is a software vulnerability that is unknown to the vendor

New cards
57
New cards

Data loss

The loss of files and documents either accidentally or through malicious acts

New cards
58
New cards

Data breach

The exposure of confidential or protected data, either accidentally or through malicious acts

New cards
59
New cards

Data exfiltration

The unauthorized transfer of information or files from a computer

New cards
60
New cards

Identity theft

A crime in which an attacker commits fraud by using someone else's name or existing accounts to obtain money or to purchase items

New cards
61
New cards

Availability loss

Loss of access to computer resources due to the network being overwhelmed or crashing

New cards
62
New cards
New cards
63
New cards
New cards
64
New cards
New cards
65
New cards
New cards

Explore top notes

note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 636 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(2)

Explore top flashcards

flashcards Flashcard64 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard138 terms
studied byStudied by 109 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 457 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard55 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard147 terms
studied byStudied by 39 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard52 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)