Vulnerabilities
Security Concepts
Malicious Activities
Infrastructure
Handouts
100

Zero-day, Poor Data Sanitization, Unpatched software, Credential Theft, Vulnerable APIs, Unauthorized Access

What are common vulnerabilities?

100

Veiled collective of internet sites that are not indexed and are only accessible by a specialized web browser such ToR, Freenet, or Subgraph OS.

What is Dark Web

100

Common Cyberattack where malicious software executes unauthorized actions on the victim's system.

What is Malware Attack?

100

Transferring risk to a cloud provider or an insurance company, or a shared disaster recovery site for high availability and disaster recovery planning.

What is Risk Transference?

100

a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

what is internet?

200

Security testing, in which the assessors simulate rea-world attacks, to identify methods for evading the security features, or controls of an application, system or network.

What is penetration testing?

200

Can lead to Credential harvesting or finding other information in dumpsters or shredded paper repositories.

What is Dumpster diving?

200

A popular form of malware that encrypts key files and holds them for ransom.

What is Ransomware?

200

Infrastructure where capability provided to the consumer is to provision processing, serverless and server-based storage, networks, databases, and other fundamental computing resources where the consumer can deploy and run arbitrary software.

What is Infrastructure as a Service? IaaS

200

a device that forwards data packets to the appropriate parts of a computer network.




What is Router?

300

The inability to refute responsibility. Usually accomplished with a public/private key pair cryptosystem and digitally signed certificates between sending and receiving parties.

What is Non-repudiation?

300

USBS, Firewire, and Memory Cards

What is Removable Device?

300

A malicious cyber threat actor prevents legitimate subjects from accessing information systems, infrastructure devices, or other network recourses.

What is DoS?(denial-of-service)

300
Infrastructure where the consumer does not manage or control the underlying cloud infrastructure, the network, the servers, the operating systems, or storage.

What is Platform as a Service? (PaaS)

300

a computer or computer program which manages access to a centralized resource or service in a network.

What is Server?

400

Granting an authenticated entity permission to access a resource or perform a specific function.

What is Authorization?

400

The persons, methods, operations, techniques, systems, or entities that act (or have the potential to act) with intent to initiate, transport, carry out, or in any way support a particular threat or exploit.

What is Agents or Actors?

400

An attack that floods a server with Internet traffic or internal traffic as well.

What is DDoS?(distributed denial-of-service attack)

400

A logical design approach used to mitigate the risk of an open network by segmenting infrastructure services.

What is Security Zones.

400

the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market

What is Sec+

500

Attacks that happen by just drive-by web surfing, or there's no acceptable use policy or the employee accidentally violated the policy. Could be through emails, webmail, or something stored on a USB fob.

What is Unstructured Attacks?

500

A common attack that's been run against front-end services like web servers and Microsoft SharePoint that use SQL as a database repository.

What is SQL injection?

500

An attacker attempts to modify the DNS cache in the wrong way so that all DNS requests return an incorrect response.

What is Cache poisoning?

500

Network security hardware and or software solution that continuously monitors a zone or multiple zones for malicious activity.

What is intrusion prevention system? (IPS)

500

the tangible elements of a computer system such as the central processing unit, hard drives, and graphics cards

What is Hardware?