Attach to legitimate files and spread when those files are executed
What is Virus?
A physical security breach where an unauthorized individual gains access to a secure area by closely following someone with legitimate access
What is Tailgating?
An attack that attempts to steal your money, or your identity, by getting you to reveal personal information such as credit card numbers, bank information, or passwords on websites that pretend to be legitimate.
What is Phishing?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity.
Who are hackers?
A security system that requires users to provide two or more verification factors to access an account or system.
Disguise themselves as legitimate software to trick users into installing them.
What is Trojan?
The practice of obtaining sensitive information by searching through discarded materials, such as trash or recycling bins
What is Dumpster Diving?
A type of cybercrime where criminals use phone calls to trick individuals into revealing sensitive information, such as bank details, passwords, or personal data.
What is a Vishing?
Hardware that provides multi-factor authentication (MFA) to protect online accounts and sensitive data, often replacing traditional passwords or acting as a second authentication factor.
What is YubiKey? (Security Key)
Encrypts files and demands a ransom for their decryption.
What is Ransomware?
The act of directly observing someone's actions to steal sensitive information, like passwords or personal details, by visually monitoring their screen or keyboard input.
What is Shoulder Surfing?
Type of cyberattack where scammers use deceptive text messages (SMS) to trick individuals into revealing sensitive information or downloading malicious software.
Who is Smishing?
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups? (Cybercriminals)
Designed to detect and destroy computer viruses.
What is a Antivirus?
Monitors user activity and collects sensitive information.
What is Spyware?
This technique involves asking seemingly harmless questions or engaging in casual conversation to extract sensitive information from individuals. The attacker might appear friendly or helpful to lower the victim's guard and encourage them to divulge information.
What is Elliciatiation?
Type of online fraud where attackers register domain names that are very similar to legitimate, popular websites, often with minor misspellings or variations. This can lead to various malicious activities, such as stealing personal information, spreading malware, or conducting phishing attacks.
What is Typosquatting?
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking? (Nation-Station Actors)
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What if a Firewall?
What is Adware?
This involves leaving a physical "bait" item in a location where it is likely to be found by an employee. The physical hardware may contain malware or a link to a malicious website, which, when accessed, can compromise the system.
What is USB Baiting? (USB attack)
Cybersecurity attack where an attacker compromises a website frequently visited by a specific group of targets, then injects malicious code (malware) to infect users who visit the site.
What is a watering hole?
Motivated by political or social causes, using cyberattacks to promote their agenda.
Who are Hacktivists?
Network security concept that creates a buffer zone between an organization's internal network and the untrusted internet.
What is DMZ? (Demilitarized Zone)