Identify, Protect, Detect, Respond, Recovery
Cybersecurity Lifecycle
a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
Script Kiddie
The art of manipulating people so they give up confidential information, which includes your passwords, bank information, or access to your computer
Social Ideology
This type of malware can occur if a legitimate advertisement is clicked
Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
Botnet
server/computer that contains all the resources for the users of the LAN
It’s devices are organized and connected by the system administrator
Properties of LANS
a cyber security risk that originates from within an organization. It typically occurs when a current or former employee, contractor, vendor or partner with legitimate user credentials misuses their access to the detriment of the organization's networks, systems and data.
Insider
Companies steal information from competitors to gain the upper hand or eliminate the competition
Industry espionage
This type of malware does not need a user to spread it can replicate and infect other computers
Worm
Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive Information
Keylogger
The term used to describe weaknesses in a system that allows an unauthorized
Vulnerabilities
Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist.
Hacktivist
Criminals steal money from individuals and corporations, such as banks and lending houses.
Financial gain
A malicious program that disguises itself as a legitimate software that users believe they installed
Trojan Horse
the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties
Man in the middle
A device that forwards data packets to networks
Function of a router
Global cyber syndicates are. organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct, including identity theft, online fraud, and computer extortion for monetary gain.
Cyber Syndicate
An "insider", meaning an employee of an organization, exposes an injustice or some criminal behavior that the organization is committing
Whistleblower
Software that secretly collects information on you
Spyware
Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it. Ransomware can spread like a virus, worm, or Trojan horse.
Ransomware
HTTP Port
Port 80
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Warfare/Espionage
a method where cybercriminals flood a network with so much malicious traffic that it cannot operate or communicate as it normally would. This causes the site's normal traffic, also known as legitimate packets, to come to a halt
DDoS Attacks
This type of malware’s sole purpose is meant to be intimidating and are almost never legitimate. They are often difficult to dismiss and won’t cancel. Often install malware.
Pop ups
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkit