Terminology
Types of Attacks
Malware
Protection
Authentication
100
The concept that indicates exposure to the chance of damage or loss.
What is Risk?
100
An attack that targets computer networks, or the network of sites the computer is trying to use.
What is Denial of Service (DOS) Attack?
100
Install Anti-Virus/Anti-Malware Software
What is a method to protect against Malware?
100
A model designed to guide policies for information security within an organization.
What is CIA - Confidentiality, integrity and availability?
100
A specific piece of information used in conjunction with an algorithm to perform encryption and decryption
What is a Key?
200
Any event or action that could potentially result in the violation of a security requirement, policy or procedure.
What is a Threat?
200
An attack type intercepts the encrypted data before it can be encrypted, giving the attacker access to sensitive data including credit card information and social security numbers.
What is SSL attack?
200
Used by viruses, worms, Trojan horses making it hard to detect and eliminate.
What is encryption?
200
The method of uniquely validating a particular entity or individual’s credentials.
What is Authentication?
200
The method of uniquely validating a particular entity or individual’s credentials.
What is Authentication?
300
Occurs when an attacker accesses a computer without the authorization to do so
What is an Intrusion?
300
An attack based on deceiving users or administrators at the target site into revealing confidential or sensitive information.
What is a Social Engineering Attack?
300
A standalone malware computer program that replicates itself in order to spread to other computers.
What is a Worm?
300
A credential or something the user knows, has or does.
What is an Authentication Factor?
300
A security mechanism that requires each party in a communication to verify the identity of the other party.
What is Mutual Authentication?
400
A technique used to exploit a vulnerability to any application on a computer system without the authorization to do so.
What is an Attack?
400
An attack using software to gather sensitive information.
What is a malware attack?
400
Applications that allow computers to be accessed remotely.
What is a Backdoor?
400
Information security seeks to maintain the principle of keeping the consistency, accuracy, and trustworthiness of data over its entire life cycle
What is Integrity?
400
This security measure allow for both authentication and non-repudiation.
What is Digital Signatures?
500
Used to be referred to as computer viruses.
What is Malware?
500
An attack top trick internet surfers into downloading malware that is disguised as a software application or an update.
What is a Browser Attack?
500
A program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
What is a Trojan Horse?
500
The goal of ensuring the person that sent a transmission or created data remains associated with the data.
What is Non-Repudiation?
500
A method of taking data, encrypting it, and creating unpredictable, irreversible output
What is Hashing?