Bash, the Crucial Exams Chat Bot
AI Bot

Security Threats and Vulnerabilities  Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

FrontBack
AdwareSoftware that automatically displays or downloads advertisements, sometimes malicious
BotnetA network of compromised devices controlled remotely to launch attacks like DDoS
Brute Force AttackAttempting to guess passwords or encryption keys through repeated trials
Cross-Site Scripting (XSS)An attack where malicious scripts are injected into trusted websites to target users
DDoS AttackDistributed Denial of Service attack that overwhelms a server or network with traffic to disrupt operations
Insider ThreatA security threat originating from within an organization, like careless or malicious employees
MalwareMalicious software such as viruses, worms, trojans, or ransomware designed to harm or exploit systems
MitM Attack (Man-in-the-Middle)An attack where attackers intercept and alter communication between two parties
PhishingA social engineering attack where attackers trick users into revealing sensitive information or credentials
Privilege EscalationExploiting a vulnerability to gain unauthorized access to higher system privileges
Rainbow Table AttackUsing precomputed hash values to crack passwords quickly
RansomwareMalware that encrypts data and demands payment for its decryption
Shoulder SurfingPhysically observing personal information like passwords or PINs while the victim types
Social EngineeringManipulating individuals to reveal confidential or sensitive information
SpywareMalware that secretly monitors and collects user activity and information
SQL InjectionAn attack where an attacker inserts malicious SQL queries into input fields to manipulate databases
Trojan HorseA type of malware disguised as legitimate software to gain access to systems
Unpatched SoftwareSoftware vulnerabilities left unaddressed due to missing updates or patches
Weak PasswordsEasily guessable passwords that can expose systems to unauthorized access
Zero-Day VulnerabilityA software vulnerability unknown to the vendor, making it exploitable before detection or patching
This deck focuses on identifying and understanding common cybersecurity threats, attack vectors, and system vulnerabilities.
Share on...
Follow us on...