& TECHNIQUES
After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities... What type of attacker is this?
What is a GRAY HAT attacker
This is the unique name given to a Wi-Fi network
What is a SSID?
This type of attack results in some sort of interruption of network service to users, devices or applications.
What is a Denial Of Service attack? (DoS)
A security device that monitors and controls incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks.
What is a Firewall?
These are written to do harm and be classified into many categories based on how they propagate and behave.
What are Viruses
An individual user profile on a social network site is an example of a ________________ identity.
What is "Online"
This a program that protects your computer from malicious software
What is Anti-Virus Software
A ____________ is a group of bots, connected through the Internet, that can be controlled by a malicious individual or group.
What is a Botnet?
This is a malicious act where a hacker essentially eavesdrops on a conversation to steal information like login credentials, credit card numbers, or other personal details.
What is a "Man-in-the-Middle Attack"
Cybersecurity term for "This for That"
What is "Quid Pro Quo?"
A security method that requires users to provide multiple forms of identification to access an online account.
What is two factor authentication?
What does SSID stand for?
What is Service Set Identifier? (SSID)
The most common goal of this, is to increase traffic to malicious sites that may host malware or attempt social engineering
What is SEO Poisoning? (search engine optimization)
a type of social engineering attack where a cybercriminal creates a fabricated scenario to manipulate a victim into divulging sensitive information.
What is Pretexting?
What is the main purpose of cyberwarfare?
To gain an advantage over other NATIONS... ( You MUST say NATIONS in your answer! )
What are the foundational principles for protecting information systems as outlined in the McCumber Cube?
What are Confidentiality, Integrity, and Availability
According to the Intro to Cybersecurity Curriculum, in order to prevent unauthorized access to your devices, you should consider using these instead of passwords
What is a PassPhrase?
A type of attack that originates from multiple, coordinated sources, and an interruption of network service to users, devices or applications occurs.
What is a Distributed Denial of Service (DDoS)
This is a form of threat detection that involves capturing and analyzing the flow of communication between a user on the local network and a local or remote destination.
What is Behaivor-based Security?
This is a hidden method that allows unauthorized access to a computer system or network
What is a "Backdoor?"
______________ is an Internet-based conflict that involves the penetration of information systems of other nations.
What is CYBERWARFARE?
These are security measures deployed on a network to find AND stop malicious activities.
What are Intrusion Detection Systems and Intrusion Prevention Systems
This is the manipulation of people into performing actions or divulging confidential information.
What is Social Engineering?
_____________ is the formal process of continuously identifying and assessing risk in an effort to reduce the impact of threats and vulnerabilities.
What is Risk Management?
A collection of repeatable queries or reports that outline a standardized process for incident detection and response
What is a Security Playbook?