Social Engineering and Cybersecurity Threats

SmoothestKnowledge avatar
SmoothestKnowledge
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What is the primary objective of a DDoS attack?

Slow down or completely shut down a target system, denying service to genuine customers or structures.

What is the primary goal of a Man-in-the-Middle attack?

To get information and data from either party while sending malicious associations or data.

What is malware?

Malicious software that executes unauthorized activities on a system.

What is the primary goal of phishing attacks?

To steal client information, such as login credentials and credit card numbers.

What is the difference between a DDoS attack and a Man-in-the-Middle attack?

A DDoS attack aims to slow down or shut down a target system, while a Man-in-the-Middle attack aims to intercept and steal data.

What is the impact of a successful DDoS attack?

The target system becomes unavailable to genuine customers or structures.

What is the role of malware in cybersecurity threats?

Malware is a type of malicious software that executes unauthorized activities on a system.

What is the primary goal of cybersecurity?

To protect systems and data from unauthorized access and malicious activities.

What is the difference between malware and phishing?

Malware is a type of malicious software, while phishing is a type of social engineering attack.

What is the impact of a successful phishing attack?

The theft of client information, such as login credentials and credit card numbers.

Study Notes

Cybersecurity Risks and Attacks

  • Social Engineering: an attack vector that relies on human interaction and manipulation to gain unauthorized access to systems, networks, or physical locations, often using psychology to trick individuals into breaking security protocols and best practices.

Types of Attacks

  • Accomplice Aggressor: an attack where the attacker sends a malicious email or text, tricking the recipient into clicking a toxic link, which can initiate malware installation, ransomware attacks, or data breaches.
  • SQL Injection (SQLI): an attack that injects malicious SQL code into a backend database, gaining unauthorized access to sensitive information, such as customer records, buyer details, or entire tables.

Cybersecurity Measures

  • Information Mining: a technique used to prevent phishing and fake sales by detecting malicious activities.
  • Example Coordination: used for fingerprinting, facial recognition, and voice recognition in defense and military applications.
  • Fuzzy Logic: used in malware penetration detection.

Research on Machine Learning Algorithms

  • 2019 Research by Springer: evaluated machine learning algorithms (SVM, ANN, NB, DT, and USML) for detecting Botnet DDoS attacks using UNBS-NB fifteen and KDD99 datasets.

Classification of Cybersecurity Risks

  • DDoS Attack: a distributed denial-of-service attack where multiple compromised computers target a single system, causing it to slow down or shut down, denying service to legitimate users.
  • Man-in-the-Middle Attack: a type of eavesdropping attack where attackers intercept and alter communication between two parties, often to steal sensitive information.
  • Malware Attack: a cyber-attack where malicious software executes unauthorized activities on a victim's system, including ransomware, spyware, and Trojan horses.
  • Phishing Attack: a social engineering attack that tricks individuals into revealing sensitive information, such as login credentials or credit card numbers.

Learn about the tactics used in social engineering attacks, including tricking victims into opening malicious emails and links, and how they can lead to malware, ransomware, and data breaches.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser