Cyber Threat correct answers An act in which the adversary attempts to gain unauthorized access to an organization's network by exploiting communication paths
Cyber Security Attack Vectors correct answers - Cloud Computing Threats
- APTs
- Viruses and Worms
- Ransomware
- Mobile Threats
-...
CTIA (Module 2) Cyber Threats and Kill
Chain Meyhodology
Cyber Threat correct answers An act in which the adversary attempts to gain
unauthorized access to an organization's network by exploiting communication paths
Cloud Computing correct answers An on-demand delivery of IT capabilities in which IT
infrastructure and applications are provided to subscribers as a metered service over a
network
APT (Advanced Persistent Threat) correct answers A threat that focuses on stealing
information from the victim machine without its user being aware of it
Viruses and Worms correct answers The most prevalent networking threat that are
capable of infecting a network within seconds
Virus correct answers A self-replicating program that produces a copy of itself by
attaching to another program, computer boot sector, or document.
Worm correct answers A worm is a malicious program that replicates, executes, and
spreads across network connections.
Ransomware correct answers A type of malware, which restricts access to a computer
system's files and folders and demands an online ransom payment to the malware
creator(s) to remove the restrictions.
Botnet correct answers A huge network of compromised systems used by attackers to
perform DOS attacks.
, Insider Threat correct answers Can be used to launch an attack by someone from
within an organization who has authorized access to its network and is aware of the
network architecture
Phishing correct answers A practice of sending an illegitimate email falsely claiming to
be from a legitimate site in an attempt to acquire a user's personal or account
information.
Web Application Attacks correct answers ___ like SQL injection and XSS have made
web applications a favorable target for the attackers to steal credentials, setup a
phishing site, or acquire private information.
IoT correct answers The ___ devices connected to the Internet have little to no
security, which makes them vulnerable to various types of attacks.
Network correct answers The collection of computers and other hardware connected by
communication channels to share resources and information.
Network Threats correct answers - Information gathering
- Sniffing and eavesdropping
- Spoofing
- Session hi-jacking
- MITM attack
- DNS and ARP poisoning
- Password-based attacks
- DOS attacks
- Compromised-key attacks
- Firewall and IDS attack
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller HopeJewels. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.