CYB 203

Cards (15)

  • Cybersecurity is the protection of computer systems, data and networks from unauthorized access with the aim ensuring confidentiality, integrity and availability of information
  • Cybersecurity Fundamentals(CIA triad):
    1. Confidentiality: This is the protection of sensitive information from unauthorized access.
    2. Integrity: This is the assurance that sensitive information/ data remains accurate, unaltered and trustworthy throughout its lifecycle.
    3. Availability: This is ensuring that information can be easily accessed by authorized users only
  • A cybersecurity attack is a deliberate compromise of a computer system, data or networks with the sole aim of stealing information, disrupting normal operation or to cause damage
    Types of Cyberattack:
    1. web based attack
    2. system based attack
  • Injection Attack

    An attack where data or a malicious code is injected into a computer system or network to compromise or manipulate its functionality or to steal information
  • Dictionary attack
    An attack where an attacker gets a list (dictionary) of password and keeps on trying until the right password
  • Man-in-the-middle
    An attack where a third party intervenes a communication between two parties without their knowledge to steal information, often to eavesdrop, or to inject malicious content
  • Phishing
    An attack where attackers impersonate trustworthy entities with the purpose of tricking users into providing sensitive information
  • Protocol attacks

    Attacks that exploit the vulnerabilities in the protocols used in a network or computer system
  • Session Hijacking
    An attack where an attacker takes over an active session between a user and a computer system or network
  • Brute force
    An attack where attackers try to gain unauthorized access by trying to guess encrypted keys, password or personal identification number until it is found
  • DNS spoofing
    A cyberattack whereby the Domain Name System is manipulated to a different IP address thereby leading the user to a malicious site which makes their system vulnerable to attackers
  • Web-Based Attack
    An attack that takes place over the internet
  • URL interpretation
    A type of attack where the URL is manipulated to gain unauthorized access or steal information
  • File inclusion attack
    An attack where an attacker makes use of the vulnerabilities that are in a web application with the sole purpose of planting malicious file or script
  • Denial-of-Service
    An attack where the normal functioning of a network or computer system is disrupted by overwhelming it with traffic or requests