Cybersecurity Terms
Malware / Spyware
POTPOURRI 1
Social Engineering
POTPOURRI 2
100

Any action that could potentially cause harm to an asset

What is a THREAT?

100

____________ are often the weakest link in the chain for ransomware

What are USERS or PEOPLE?

100

The term used for devices that are often connected to business or residential networks and often have few security measures enabled 

What is IoT? (Internet of Things)

100

This is when an attacker waits for an authorized subject to open a door or gate and walks in behind the authorized subject

What is TAILGATING? 

100

This a term used when a subject is challenged to provide information only a genuine identity would possess 

What is AUTHENTICATION?

200

Any weakness in a system specifically related to one or more assets

What is a VULNERABILITY?

200

A type of malware that can self-replicate and spread across computer networks without requiring human interaction, exploiting vulnerabilities in software or network protocols

What is a WORM?

200

Describe a DDoS attack....

When a network becomes overwhelmed by traffic originating from multiple sources ...(key word is multiple)

200

This is when an attacker asks for information from a victim or for the victim to perform an action that results in information disclosure 

What is PHISHING?

200

An attack that targets an initiation of a session between a consumer and service provider to intercept communications and gain information

What is a MAN-IN-THE-MIDDLE ATTACK?

300

What is an Attack Vector?

What is "The path that an attacker takes to exploit specific vulnerabilities"?

300

When an attacker causes havoc by infecting a computer, identifying important files on it, and then encrypts the files and asks for something in return.

What is RANSOMWARE?

300

A widely used public-key cryptosystem that enables secure communication and data protection by using a pair of mathematically linked keys: a public key for encryption and a private key for decryption.

What is an ALGORITHM?

300

A type of cybercrime where attackers send deceptive text messages to trick victims into revealing sensitive information, clicking malicious links, or downloading harmful software.

What is SMISHING  or (SMS PHISHING)?

300

An unskilled individual who uses scripts or programs developed by others.

What is a SCRIPT KIDDIE?

400

The steps that an attacker takes to carry out an attack on one or more vulnerabilities

What is an EXPLOIT?

400

This disguises itself as legitimate software, designed to deceive users into running it, allowing attackers to gain access to their systems.

What is a TROJAN HORSE?

400

The term used for an individual with privileged access who can cause significant damage to an IT environment due to their knowledge about the environment they are attacking 

What is an INSIDER THREAT?

400

The process of verifying the identity of a user, device, or system, ensuring that the person or entity attempting to access a resource is who they claim to be, often as a prerequisite for granting access.

What is AUTHENTICATION?

400

a one-way process that transforms data into a fixed-size string (a "digest") using a mathematical algorithm, ensuring data integrity and security, especially for password storage and digital signatures.

What is HASHING?

500

The probability that a threat will be realized against a vulnerability

What is RISK?

500

______________  collects behaviors and demographic information on users and sends it to a data collector.

What is SPYWARE?

500

In cybersecurity, what is AAA?

What is Authentication, Authorization, and Accounting?

500

A decoy system designed to attract and trap cyber attackers, allowing security professionals to study their methods and tactics without risking real systems.

What is a HONEYPOT OR HONEYTRAP?

500

This is a sophisticated, targeted cyberattack where an unauthorized user gains access to a network and remains undetected for an extended period, often to steal sensitive data or disrupt operations. 

What is an APT? (Advanced Persistent Threat)