Bash, the Crucial Exams Chat Bot
AI Bot

Security Threats and Vulnerabilities Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

Study our Security Threats and Vulnerabilities flashcards for the ISC2 Certified in Cybersecurity (CC) exam with 20+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
ISC2 Certified in Cybersecurity (CC) Course Header Image
FrontBack
AdwareSoftware that automatically displays or downloads advertisements, sometimes malicious
BotnetA network of compromised devices controlled remotely to launch attacks like DDoS
Brute Force AttackAttempting to guess passwords or encryption keys through repeated trials
Cross-Site Scripting (XSS)An attack where malicious scripts are injected into trusted websites to target users
DDoS AttackDistributed Denial of Service attack that overwhelms a server or network with traffic to disrupt operations
Insider ThreatA security threat originating from within an organization, like careless or malicious employees
MalwareMalicious software such as viruses, worms, trojans, or ransomware designed to harm or exploit systems
MitM Attack (Man-in-the-Middle)An attack where attackers intercept and alter communication between two parties
PhishingA social engineering attack where attackers trick users into revealing sensitive information or credentials
Privilege EscalationExploiting a vulnerability to gain unauthorized access to higher system privileges
Rainbow Table AttackUsing precomputed hash values to crack passwords quickly
RansomwareMalware that encrypts data and demands payment for its decryption
Shoulder SurfingPhysically observing personal information like passwords or PINs while the victim types
Social EngineeringManipulating individuals to reveal confidential or sensitive information
SpywareMalware that secretly monitors and collects user activity and information
SQL InjectionAn attack where an attacker inserts malicious SQL queries into input fields to manipulate databases
Trojan HorseA type of malware disguised as legitimate software to gain access to systems
Unpatched SoftwareSoftware vulnerabilities left unaddressed due to missing updates or patches
Weak PasswordsEasily guessable passwords that can expose systems to unauthorized access
Zero-Day VulnerabilityA software vulnerability unknown to the vendor, making it exploitable before detection or patching

About the Flashcards

Flashcards for the ISC2 Certified in Cybersecurity (CC) exam provide a quick way to recall essential cybersecurity threats and attack vectors tested on the assessment. The deck defines phishing, malware variations like ransomware and spyware, and exploits such as SQL injection, cross-site scripting, and zero-day vulnerabilities, ensuring you recognize how attackers compromise systems and data.

Study cards also highlight distributed denial-of-service attacks, man-in-the-middle interceptions, botnets, brute-force and rainbow-table password cracking, privilege escalation, and the risks of weak passwords, unpatched software, and insider threats. Reviewing these concise definitions helps you quickly connect terminology to real-world scenarios and reinforce the key ideas likely to appear on exam questions.

Topics covered in this flashcard deck:

  • Malware types
  • Web application attacks
  • Social engineering
  • Password security
  • Network denial-of-service
  • Insider & privilege risks
Share on...
Follow us on...