TSA - Cybersecurity Prep Latest Update with Verified Solutions
TSA - Cybersecurity Prep Latest Update with Verified Solutions Antimalware Software that defends against viruses and malware Virus A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data Malware (Malicious Software) consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices Ransomware a type of malicious software designed to block access to a computer system until a sum of money is paid. Adware forces unwanted advertising onto your computer screen. Phishing a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail data breach The unintended release of sensitive data or the access of sensitive data by unauthorized individuals. Trojan Horse a program that appears desirable but actually contains something harmful Sandboxing An isolated test environment that simulates the production environment but will not affect production components/data. Emotet A Trojan Horse that hides in malspam Emails, and lies dormant in the event of a Sandbox. malspam Emails containing malware or viruses. Spyware software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Antivirus software that is specifically designed to detect viruses and protect a computer and files from harm Keylogger A small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard. SQL Injection An attack that targets SQL servers by injecting commands to be manipulated by the database. Spam unsolicited email or junk mail DDoS Denial of service attack committed using dozens of computers, usually zombies on a botnet. Spoofing Attack A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Exploit Attack A data breach that takes advantage of software vunerabilities. Malvertising the practice of incorporating malware in online advertisements. identity theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. Backdoor Method of bypassing security in a system, built in by the system designers. Encryption Process of converting readable data into unreadable characters to prevent unauthorized access. Decryption a process that reverses encryption, taking a secret message and reproducing the original plain text VPN (Virtual Private Network) A private network that is configured within a public network such as the Internet Social Engineering using deception to obtain unauthorized access to information resources
Written for
- Institution
- TSA - Cybersecurity
- Course
- TSA - Cybersecurity
Document information
- Uploaded on
- January 24, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
tsa cybersecurity prep latest update with verifi
Also available in package deal