Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cybersecurity Terms

15

Flashcards

0/15

Still learning
StarStarStarStar

Zero-Day Exploit

StarStarStarStar

A cyber attack that occurs on the same day a weakness is discovered in software. At that point, the software developers have had zero days to create patches. Examples include attacks that take advantage of newly discovered vulnerabilities before they're patched.

StarStarStarStar

Social Engineering

StarStarStarStar

Manipulation technique that exploits human error to gain private information, access, or valuables. Examples include pretexting, baiting, and tailgating.

StarStarStarStar

Man-in-the-middle Attack

StarStarStarStar

An attack where the attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other. Examples include eavesdropping on or altering the communication between an end user and a web service.

StarStarStarStar

Threat Intelligence

StarStarStarStar

Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets. Examples include feeds of known malicious IP addresses or the analysis of new malware.

StarStarStarStar

Phishing

StarStarStarStar

A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. Examples include fake website login pages and scam emails.

StarStarStarStar

Keylogger

StarStarStarStar

A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Keylogger software is sometimes part of malware payloads. Examples include malicious software that captures bank account information.

StarStarStarStar

Firewall

StarStarStarStar

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Examples include both hardware and software solutions like iptables or commercial firewalls from companies like Cisco.

StarStarStarStar

Spear Phishing

StarStarStarStar

An email targeted at a specific individual or department within an organization that appears to be from a trusted source. It's much more sophisticated than phishing because it often involves some form of social engineering. Examples include emails targeting a company's financial department.

StarStarStarStar

Encryption

StarStarStarStar

The process of converting information or data into a code, especially to prevent unauthorized access. Examples include SSL/TLS for secure web browsing and AES for secure file storage.

StarStarStarStar

VPN

StarStarStarStar

Virtual Private Network extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Examples include services like NordVPN and ExpressVPN.

StarStarStarStar

Ransomware

StarStarStarStar

A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Examples include WannaCry and Petya.

StarStarStarStar

Malware

StarStarStarStar

Malicious software designed to harm or exploit any programmable device or network. Examples include viruses, worms, Trojan horses, and ransomware.

StarStarStarStar

Botnet

StarStarStarStar

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages or to launch DDoS attacks. Examples include the infamous Mirai botnet.

StarStarStarStar

Multi-factor Authentication (MFA)

StarStarStarStar

A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity. Examples include combining a password with a text message code or a biometric verification.

StarStarStarStar

DDoS Attack

StarStarStarStar

Distributed Denial of Service Attack is an attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Examples include attacks on major websites like GitHub or banks.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.