Explore tens of thousands of sets crafted by our community.
Cybersecurity Terms
15
Flashcards
0/15
Zero-Day Exploit
A cyber attack that occurs on the same day a weakness is discovered in software. At that point, the software developers have had zero days to create patches. Examples include attacks that take advantage of newly discovered vulnerabilities before they're patched.
Social Engineering
Manipulation technique that exploits human error to gain private information, access, or valuables. Examples include pretexting, baiting, and tailgating.
Man-in-the-middle Attack
An attack where the attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other. Examples include eavesdropping on or altering the communication between an end user and a web service.
Threat Intelligence
Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets. Examples include feeds of known malicious IP addresses or the analysis of new malware.
Phishing
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. Examples include fake website login pages and scam emails.
Keylogger
A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Keylogger software is sometimes part of malware payloads. Examples include malicious software that captures bank account information.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Examples include both hardware and software solutions like iptables or commercial firewalls from companies like Cisco.
Spear Phishing
An email targeted at a specific individual or department within an organization that appears to be from a trusted source. It's much more sophisticated than phishing because it often involves some form of social engineering. Examples include emails targeting a company's financial department.
Encryption
The process of converting information or data into a code, especially to prevent unauthorized access. Examples include SSL/TLS for secure web browsing and AES for secure file storage.
VPN
Virtual Private Network extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Examples include services like NordVPN and ExpressVPN.
Ransomware
A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Examples include WannaCry and Petya.
Malware
Malicious software designed to harm or exploit any programmable device or network. Examples include viruses, worms, Trojan horses, and ransomware.
Botnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages or to launch DDoS attacks. Examples include the infamous Mirai botnet.
Multi-factor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Examples include combining a password with a text message code or a biometric verification.
DDoS Attack
Distributed Denial of Service Attack is an attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Examples include attacks on major websites like GitHub or banks.
© Hypatia.Tech. 2024 All rights reserved.