In cybersecurity, a V_____ refers to a malicious piece of computer code designed to spread from one device to another, replicating itself and potentially damaging data or disrupting system operations; essentially, it's a type of malware that can infect files and programs on a computer, often causing harm by altering system functions or stealing data
virus
Worm
triple!
A well-known example of this type of malware is WannaCry, which spread rapidly across the globe in 2017, exploiting a vulnerability in Windows systems to encrypt user files and demand a cash payment to decrypt them; other examples include CryptoLocker and NotPetya, which also used encryption tactics to lock user data and demand payment to regain access
ransomware
______________ ____ of a computer is when someone accesses a computer system without permission or exceeds their authorized access. This can include gaining access to a computer, network, or data storage area
Unauthorized use
TRIPPLE!!
A _______ password is a combination of at least 12 characters, including a mix of uppercase and lowercase letters, numbers, and symbols, that is not easily guessable and does not contain personal information or common words, making it difficult for hackers to crack; essentially, a complex string of characters that is unique to each account you use.
A ________ horse is a type of malware that disguises itself as a legitimate program to gain access to a user's computer system. The term comes from the Greek myth.
Trojan
Tripple!!!
S_________ E____________is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Social engineering
Viruses, Worms, Spyware, Adware, Trojans, Rootkits, and Ransomware are all part of this umbrella:
Malware
A common example of ____________ used in cybersecurity is fingerprint scanning, where a user's unique fingerprint pattern is scanned to verify their identity when accessing a device or online account, often seen on smartphones and laptops for login authentication.
Biometrics
TRIPPLE!!!
A ________ __ in cybersecurity is a security expert who uses ethical hacking to identify and fix vulnerabilities in a system. These hackers are also known as ethical hackers.
This refers to a software program designed to detect, quarantine, and remove malicious software (malware) like viruses, worms, Trojans, and spyware from a computer system, essentially protecting it from harmful digital threats by scanning files and systems for suspicious patterns and taking action to neutralize them; it is considered a crucial component of basic computer security and needs to be regularly updated to combat new malware variations.
antivirus
DOUBBLE
Wi-Fi Protected Access
Tripple!
P___________ is online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data. This is typically a two-step process that begins with an attacker installing malicious code on a victim's computer or server.
Pharming
TRIPPLE!!!
Name five type of malwares
adware
botnet
spyware
Pharming
phishing
Ransomware
Rootkit
Scareware
Spyware
trojans
Virus
worms
DOUBLE!!!
__________ ____ hackers spread dangerous ransomware that infected thousands of computers around the world. Also known as a malicious cybercriminal who gains unauthorized access to computer systems and networks with the intent to cause harm, often by stealing sensitive data, disrupting systems, or extorting money, exploiting vulnerabilities in software or corporate systems for personal gain, and violating laws in the process.
Black hat
An example of ________ ____ would be if someone used your Social Security number to open a credit card in your name without your knowledge or consent, leading to charges on the card that you didn't make; essentially, someone is using your personal information to make purchases or access services as if they were you.
identity theft
Tripple!
__________ is a cyber attack that tricks users into clicking on something other than what they intended.
Clickjacking
TRIPPLE!
What does PIN stans for?
Personal Identification Number
Double!
A __________ in cybersecurity is a type of malicious software that provides an attacker with privileged, administrator-level access to a computer while actively concealing its presence, essentially allowing them to operate on a system without being detected by the user or standard security tools; the term refers to the highest administrative level, essentially the "back door"
rootkit
DOUBLE!!!
One example of this method is sending a code to a user's mobile phone via text message, and this sending code from the site must be entered in addition to the password to log in. This created an extra layer of protection.
2fa or two factor authentication
A __________ is used to monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks, essentially preventing unauthorized access and malicious traffic from entering a system by filtering data based on predetermined security rules; its primary purpose is to protect against cyberattacks and safeguard sensitive data within a network.
Firewall
A _________ ___ ___________ is when a user unknowingly downloads malicious software onto their computer simply by visiting a compromised website, often triggered by a hidden code within the webpage, without any active action on their part; for example, visiting a seemingly legitimate website that has been infiltrated by malware, causing an automatic download of a virus when the user browses the page, even if they don't click on anything suspicious.
drive by download
TRIPPLE!
___________ is a method of protecting data by scrambling it with a mathematical formula so that only authorized users can access it (think of keys)
Encryption
S_______ is a cybercrime where someone or something impersonates a trusted source to gain access to sensitive information. Thia can take many forms, including fake emails, phone calls, websites, and text messages
spoofing
Tripple!
__________ is a type of malware that displays unwanted advertisements on a device. It's designed to make money for its creator by displaying ads to users. Adware can be installed on computers and mobile devices
Adware
An example of an ____________ ___ ____________ could be a company guideline stating that employees can only use company-approved software on company devices, prohibiting the installation of unauthorized programs, and requiring them to protect sensitive data by not sharing passwords or accessing information not relevant to their job function; essentially outlining what constitutes appropriate use of company technology and what activities are considered unacceptable
acceptable use policy or aup
This type of malware that displays unwanted ads on a device. It can be delivered to a device through a variety of means, including downloading an app or clicking on a link on an untrustworthy website
This is a security standard that protects wireless networks from unauthorized access. It uses encryption and authentication methods to keep data safe
WPA or WIFI protected access
P__________ refers to a malware fraudulent practice where attackers send seemingly legitimate emails or messages, often disguised as coming from a trusted source, to trick users into revealing sensitive information like passwords, credit card details, or personal data, with the goal of stealing money or gaining unauthorized access to systems.
Attackers use social engineering tactics to create convincing messages that appear to be from a reputable company like a bank, online retailer, or even a colleague, prompting the user to click on malicious links or provide personal information.
phishing
A ________ is a person who uses their technical knowledge to gain unauthorized access to computer systems or networks, often by exploiting vulnerabilities to steal data, disrupt operations, or cause damage.
Hacker or black hat
double!!
P______________________ refers to when an unauthorized person gains access to a restricted system or area by following closely behind an authorized user, essentially "riding on their back" to bypass security measures and gain entry without proper credentials, often through physical means like following someone through a door without scanning their access card, or digitally by connecting to a network using another user's active connection.
piggybacking.
A common example of a d______ ___ _ S_________ attack is when a malicious actor floods a website with a large volume of traffic from multiple sources, effectively preventing legitimate users from accessing the site by overwhelming its server capacity, essentially "crashing" the website and making it unavailable to normal users; this traffic originates from many different locations
DOS OR DENIAL OF SERVICE
DOUBLE!!
S___________ is a type of malware that secretly collects and sends data from a user's computer to third parties without their consent. It can damage a device and monitor or control how the user uses it.
spyware
double!
A common example of a B________ is a network of compromised computers used to launch a Distributed Denial-of-Service (DDoS) attack, where a large volume of traffic is sent to a target website or server, effectively crashing it by overwhelming its capacity; a notorious example of this is the "Mirai" which targeted various online services with massive traffic surges
botnet
P__________ a typical example is when a user types the URL of their bank's website into their browser and is unknowingly redirected to a fraudulent version of the site without realizing it. This can happen if malware on the user's computer or an exploited vulnerability in a system alters the settings
PHARMING
This is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. This is one reason it can be dangerous to open unexpected attachments in e-mails.
________ refers to unsolicited, bulk messages sent electronically, usually in the form of emails, that are often irrelevant or unwanted, typically used for advertising, phishing attempts, or spreading malware, and are sent to a large number of recipients without their consent; essentially, the digital equivalent of junk mail.
A _____________ _____ is a type of malware or hardware that records the keys a user types on a keyboard. Keyloggers can be used to steal sensitive information like passwords, credit card numbers, and other confidential data.
keystroke logger
I___________ P_________ is the right to control how personal data is collected, used, and shared. It also refers to the policies and procedures that govern how people are involved in the process.
Information privacy
double!!
_______________refers to the act of actively searching for unsecured Wi-Fi networks while moving around in a vehicle, usually using a laptop or smartphone to detect and map these networks, often with the intent to exploit vulnerabilities and gain unauthorized access to them; essentially, it's like driving around to find open wireless networks that could be easily hacked into.
wardriving
C__________ are small text files that websites send to your browser to store information about your visit. They can be a security risk if they are not properly designed or secured.
Cookies
A _______ ___ ___ __________ attack is a cyberattack where a hacker intercepts communications between two parties to steal sensitive information. The attacker acts as a middleman, allowing them to access and manipulate data
man-in-the-middle or MITM