Explore tens of thousands of sets crafted by our community.
Cyber Risk Essentials
20
Flashcards
0/20
Phishing
Phishing is a cyber attack that uses disguised email as a weapon. To prevent phishing, do not click on suspicious links, use email filtering solutions, and educate employees on recognizing phishing attempts.
Ransomware
Ransomware is a type of malware that encrypts a victim's files, with the attacker then demanding a ransom to restore access. To prevent ransomware, keep software updated, use antivirus programs, and regularly back up data.
DDoS Attack
A Distributed Denial of Service (DDoS) attack aims to disrupt normal web traffic and take a website offline by overwhelming it with a flood of internet traffic. Prevention measures include using anti-DDoS services, maintaining robust network architecture, and monitoring for unusual traffic patterns.
Social Engineering
Social engineering involves manipulating individuals into divulging confidential or personal information that may be used for fraudulent purposes. Prevent it by training employees, implementing strict security protocols, and promoting a security-aware culture.
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or network. Prevent malware attacks by using updated antivirus software, employing firewalls, and educating employees on safe internet practices.
SQL Injection
SQL Injection is a type of cyber attack used to steal data from organizations by targeting vulnerabilities in SQL databases. Prevent this by sanitizing database input, using prepared statements, and conducting regular security audits.
Zero-Day Exploit
A zero-day exploit is a cyber attack that occurs on the same day a weakness is discovered in software, before a fix becomes available. Mitigate risks by employing defensive measures such as up-to-date security solutions, intrusion detection systems, and regular system monitoring.
Insider Threat
An insider threat is a security risk that originates from within the targeted organization, often by employees or former employees. To prevent this, apply strict access controls, monitor user activity, and implement a policy of least privilege.
Advanced Persistent Threat (APT)
An APT is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. Prevention includes layered defense mechanisms, comprehensive monitoring, and swift incident response strategies.
Patch Management
Patch management is the process of distributing and applying updates to software. These updates can fix security vulnerabilities. It's prevented by establishing a systematic patch management policy, prioritizing patches based on risk, and using automated patch management tools.
Spear Phishing
Spear phishing is a more targeted version of phishing where attackers tailor their message based on their knowledge of the victim. Mitigate these attacks by providing targeted security training, using advanced email security solutions, and maintaining vigilance for suspicious messages.
Man-in-the-Middle Attack
A Man-in-the-Middle Attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. To prevent this, use encryption, avoid unsecured Wi-Fi networks, and employ mutual authentication protocols.
Cryptocurrency Theft
Cryptocurrency theft involves the fraudulent acquisition of cryptocurrencies. Protect against this threat by using strong, unique passwords, enabling two-factor authentication, and keeping wallet keys in cold storage.
Data Breach
A data breach is an incident in which information is accessed without authorization. Prevent data breaches by encrypting sensitive information, training employees in data protection, and implementing a robust information security management system (ISMS).
Cross-Site Scripting (XSS)
XSS is a security vulnerability typically found in web applications. It enables attackers to inject malicious scripts into content from otherwise trusted websites. Prevent XSS by validating and sanitizing user input, using secure coding practices, and implementing content security policy headers.
Endpoint Security
Endpoint security refers to the methodologies of protecting endpoints, like desktops, laptops, and mobile devices, from being exploited by malicious actors and campaigns. Maintain endpoint security by installing security software, regularly updating systems, and encrypting device data.
Botnet
A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge. To prevent botnets, keep systems and software updated, use firewalls and antivirus tools, and avoid clicking on suspicious links or attachments.
Supply Chain Attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply network. Mitigate risks by conducting security audits of suppliers, implementing strong contractual agreements with security provisions, and continuously monitoring for threats.
Password Attack
Password attacks are attempts to obtain or decrypt a user's password for illegal access to a system. Prevent password attacks by using strong, unique passwords, enabling two-factor authentication, and educating users on not reusing passwords.
Cloud Security
Cloud security is the set of control-based safeguards and technology protection designed to protect resources stored online from leakage, theft, or data loss. Protection involves rigorous access controls, employing encryption, and using secure cloud services providers.
© Hypatia.Tech. 2024 All rights reserved.