Any action that could potentially cause harm to an asset
What is a THREAT?
____________ are often the weakest link in the chain for ransomware
What are USERS or PEOPLE?
The term used for devices that are often connected to business or residential networks and often have few security measures enabled
What is IoT? (Internet of Things)
This is when an attacker waits for an authorized subject to open a door or gate and walks in behind the authorized subject
What is TAILGATING?
This a term used when a subject is challenged to provide information only a genuine identity would possess
What is AUTHENTICATION?
Any weakness in a system specifically related to one or more assets
What is a VULNERABILITY?
A type of malware that can self-replicate and spread across computer networks without requiring human interaction, exploiting vulnerabilities in software or network protocols
What is a WORM?
Describe a DDoS attack....
When a network becomes overwhelmed by traffic originating from multiple sources ...(key word is multiple)
This is when an attacker asks for information from a victim or for the victim to perform an action that results in information disclosure
What is PHISHING?
An attack that targets an initiation of a session between a consumer and service provider to intercept communications and gain information
What is a MAN-IN-THE-MIDDLE ATTACK?
What is an Attack Vector?
What is "The path that an attacker takes to exploit specific vulnerabilities"?
When an attacker causes havoc by infecting a computer, identifying important files on it, and then encrypts the files and asks for something in return.
What is RANSOMWARE?
A widely used public-key cryptosystem that enables secure communication and data protection by using a pair of mathematically linked keys: a public key for encryption and a private key for decryption.
What is an ALGORITHM?
A type of cybercrime where attackers send deceptive text messages to trick victims into revealing sensitive information, clicking malicious links, or downloading harmful software.
What is SMISHING or (SMS PHISHING)?
An unskilled individual who uses scripts or programs developed by others.
What is a SCRIPT KIDDIE?
The steps that an attacker takes to carry out an attack on one or more vulnerabilities
What is an EXPLOIT?
This disguises itself as legitimate software, designed to deceive users into running it, allowing attackers to gain access to their systems.
What is a TROJAN HORSE?
The term used for an individual with privileged access who can cause significant damage to an IT environment due to their knowledge about the environment they are attacking
What is an INSIDER THREAT?
The process of verifying the identity of a user, device, or system, ensuring that the person or entity attempting to access a resource is who they claim to be, often as a prerequisite for granting access.
What is AUTHENTICATION?
a one-way process that transforms data into a fixed-size string (a "digest") using a mathematical algorithm, ensuring data integrity and security, especially for password storage and digital signatures.
What is HASHING?
The probability that a threat will be realized against a vulnerability
What is RISK?
______________ collects behaviors and demographic information on users and sends it to a data collector.
What is SPYWARE?
In cybersecurity, what is AAA?
What is Authentication, Authorization, and Accounting?
A decoy system designed to attract and trap cyber attackers, allowing security professionals to study their methods and tactics without risking real systems.
What is a HONEYPOT OR HONEYTRAP?
This is a sophisticated, targeted cyberattack where an unauthorized user gains access to a network and remains undetected for an extended period, often to steal sensitive data or disrupt operations.
What is an APT? (Advanced Persistent Threat)