Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cybersecurity Essentials

20

Flashcards

0/20

Still learning
StarStarStarStar

Denial-of-Service Attack (DoS)

StarStarStarStar

A Denial-of-Service attack overwhelms a system's resources so that it cannot respond to service requests. Prevention strategies include configuring network architecture to handle unexpected traffic loads, using anti-DoS tools and services, and enforcing strong network security policies.

StarStarStarStar

Firewall

StarStarStarStar

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Prevention strategies for breaches include setting strict firewall policies, regularly updating firewall rules, and segmenting networks.

StarStarStarStar

Spoofing

StarStarStarStar

Spoofing is a fraudulent or malicious practice in which communication from an unknown source is disguised as being from a known, trusted source. Prevention strategies include network filtering, authentication methods, and being wary of unexpected requests.

StarStarStarStar

Identity Theft

StarStarStarStar

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name. Prevention strategies include monitoring financial accounts regularly, using strong passwords, and shredding sensitive documents.

StarStarStarStar

Cross-Site Scripting (XSS)

StarStarStarStar

Cross-Site Scripting (XSS) is a security vulnerability typically found in web applications, which enables attackers to inject client-side scripts into web pages viewed by other users. Prevention strategies include content security policy, validating and sanitizing user inputs, and using secure programming practices.

StarStarStarStar

Phishing

StarStarStarStar

Phishing is a type of social engineering attack where an attacker sends fraudulent communications, often via email, that appear to come from a reputable source to steal sensitive data like login credentials or credit card numbers. Prevention strategies include being cautious about unsolicited communications, not clicking on suspicious links, and verifying the sender's identity.

StarStarStarStar

Worm

StarStarStarStar

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. Prevention strategies include keeping your computer and network security up to date, using firewalls, and practicing safe browsing habits.

StarStarStarStar

Keylogger

StarStarStarStar

A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Prevention strategies include installing anti-spyware or antivirus software, keeping software updated, and using virtual keyboards for sensitive information.

StarStarStarStar

Virus

StarStarStarStar

A computer virus is a type of malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code. Prevention strategies include using antivirus software, being cautious with email attachments, and avoiding clicking on unknown links.

StarStarStarStar

Two-Factor Authentication (2FA)

StarStarStarStar

Two-factor authentication is an extra layer of security used to ensure that people trying to gain access to an online account are who they say they are. Prevention strategies for unauthorized access include using 2FA on all accounts that offer it, choosing strong and unique codes, and educating users on the importance of this layer of security.

StarStarStarStar

Man-in-the-Middle Attack (MitM)

StarStarStarStar

A Man-in-the-Middle attack occurs when an attacker secretly relays and potentially alters the communications between two parties who believe they are directly communicating with each other. Prevention strategies include using encrypted connections, avoiding public Wi-Fi for sensitive transactions, and employing VPN services.

StarStarStarStar

Encryption

StarStarStarStar

Encryption is the process of converting information or data into a coded format to prevent unauthorized access. Prevention strategies for data breaches include using strong encryption algorithms, regularly updating encryption keys, and ensuring end-to-end encryption in data transmission.

StarStarStarStar

Brute Force Attack

StarStarStarStar

A brute force attack is a method used to gain information such as a user password or personal identification number (PIN) by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. Prevention strategies include implementing lockout policies, using CAPTCHA, and enforcing complex password policies.

StarStarStarStar

Trojan Horse

StarStarStarStar

A Trojan Horse is a type of malware that misleads users of its true intent, typically disguises itself as a legitimate and useful piece of software, and once activated, can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. Prevention strategies include not downloading software from untrusted sources, using reputable antivirus tools, and regularly updating software.

StarStarStarStar

Botnet

StarStarStarStar

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam. Prevention strategies include keeping your computer updated, avoiding clicking on suspicious links, and using cybersecurity tools like antivirus programs.

StarStarStarStar

Malware

StarStarStarStar

Malware, short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. Prevention strategies include using antivirus software, keeping systems updated, and avoiding downloads from unreliable sources.

StarStarStarStar

Social Engineering

StarStarStarStar

Social engineering involves manipulating individuals into divulging confidential or personal information that may be used for fraudulent purposes. Prevention strategies include educating users, enforcing strict security protocols, and maintaining a skeptical and cautious mindset when sharing information.

StarStarStarStar

SQL Injection

StarStarStarStar

SQL Injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. Prevention strategies involve using prepared statements and parameterized queries, employing stored procedures, and validating user inputs.

StarStarStarStar

Zero-day Exploit

StarStarStarStar

A zero-day exploit targets a previously unknown vulnerability in software or hardware, for which a patch has not yet been released. Prevention strategies include keeping software up to date, using advanced threat protection systems, and practicing good cybersecurity hygiene.

StarStarStarStar

Ransomware

StarStarStarStar

Ransomware is a type of malware that encrypts a victim's files, with the attacker then demanding a ransom from the victim to restore access to the data upon payment. Prevention strategies involve regularly backing up data, educating users on security practices, and keeping security patches up to date.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.