Definitions

Cards (28)

  • WPA
    A security protocol designed to secure wireless computer networks
  • TKIP
    A cryptographic protocol used in the implementation of WPA to enhance the security of wireless networks.
  • AES
    An encryption algorithm used to secure sensitive data.
  • RADIUS
    A networking protocol and software system that provides centralized authentication, authorization, and accounting management for users who connect and use a network service.
  • TACACS+
    A network protocol and authentication mechanism used primarily in enterprise environments to manage access control for network devices.
  • Phishing
    A cyber attack method used by malicious actors to trick individuals into divulging sensitive information.
  • Vishing
    A form of phishing where attackers use phone calls to deceive individuals into providing sensitive information or taking specific actions, such as transferring funds or installing malicious software.
  • Shoulder Surfing
    A form of visual eavesdropping where the attacker observes the target's actions directly, often from close proximity or over their shoulder.
  • Whaling
    A type of phishing attack that specifically targets high-profile individuals within an organization, such as executives, CEOs, or other key personnel who have access to sensitive information or hold significant authority.
  • Impersonation
    The act of pretending to be someone else, typically with the intention to deceive or defraud others.
  • Dumpster Diving
    The practice of searching through trash or e-waste with the intent to retrieve data or sensitive information.
  • Evil Twin
    A rogue wireless access point that acts as a legitimate Wi-Fi network by broadcasting the same network name as a trusted network.
  • DoS
    A type of cyber attack where malicious actors deliberately disrupt normal access to the network, primarily by flooding with illegitimate traffic or resource requests.
  • DDoS
    A type of cyber attack where multiple compromised computer systems, often referred to as "botnets," are used to flood a target system with a massive amount of illegitimate traffic or requests.
  • Zero-Day Attack
    A cyber attack that exploits a vulnerability before the software developers have had a chance to create and distribute a patch to protect users.
  • Spoofing
    Falsifying data or information to appear as though it originates from a trusted or legitimate source.
  • On-Path Attack
    An attacker intercepts and alters communication between two parties who believe they are directly communicating with each other.
    Also called Man-in-the-Middle
  • Brute-Force Attack
    A trial-and-error method used by attackers to gain access to a system, application, or encrypted data by systematically trying all possible combinations of passwords or encryption keys until the correct one is found.
  • Dictionary Attack
    A type of cyber attack that involves systematically entering a comprehensive list of words or phrases as possible passwords or passphrases in an attempt to guess the correct one.
  • Insider Threat
    A security risk posed to an organization by individuals within the organization, such as current or former employees, contractors, or business partners, who have access to sensitive information or resources.
  • SQL Injection
    A type of cyber attack that targets the SQL databases by exploiting vulnerabilities of an application to inject SQL commands, allowing attackers to manipulate the database, retrieve unauthorized information, modify data, or even execute administrative operations on the database server.
  • Cross-Site Scripting (XSS)

    A type of security vulnerability commonly found in web applications, where an attacker injects malicious scripts into web pages viewed by other users. These scripts execute in the context of the victim's browser, allowing the attacker to hijack user sessions, deface websites, steal sensitive information, or perform other malicious actions.
  • Virus
    A type of malware that replicates itself by modifying other computer programs and inserting its own code.
  • Worm
    A type of malware that replicates itself and spreads independently across computer networks without requiring user interaction, by exploiting vulnerabilities in network protocols or operating systems to automatically replicate and distribute copies of themselves to other computers or devices connected to the same network.
  • Trojan Horse
    A type of malware that disguises itself as a legitimate program or file to trick users into executing or downloading it.
  • Spyware
    A type of malware that covertly monitors and collects information about a user's activities on their computer or device without their knowledge or consent, usually gathering data such as keystrokes, personal information, and login credentials.
  • Rootkit

    A type of malware designed to gain unauthorized access and control over a computer or other electronic device, often while remaining undetected by users and security software.
  • Ransomware
    A type of malware designed to block access to a computer system or files until a ransom is paid. Attackers encrypt the victim's files or lock the entire system's functionality.