Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Cybersecurity threats represent one of the most critical challenges in modern communication technologies, and you're being tested on more than just definitions. Exam questions will probe your understanding of attack vectors, vulnerability exploitation, and defense mechanisms—the underlying logic of how threats compromise systems and what makes certain attacks more dangerous than others. Whether you're analyzing a case study or responding to an FRQ about network security, you need to understand the relationship between human behavior, technical vulnerabilities, and system architecture.
The threats covered here demonstrate key principles: defense in depth, the CIA triad (confidentiality, integrity, availability), and the constant tension between usability and security. Some attacks exploit software flaws, others manipulate human psychology, and the most sophisticated combine both approaches. Don't just memorize threat names—know what vulnerability each exploits, what layer of security it bypasses, and what countermeasures address it.
The weakest link in any security system is often the human element—these attacks exploit psychology, trust, and social norms rather than technical flaws.
Compare: Phishing vs. Social Engineering—phishing is actually a subset of social engineering, specifically using digital communications. Social engineering encompasses broader manipulation tactics including in-person deception. If an FRQ asks about human-factor vulnerabilities, social engineering is your umbrella term.
These attacks target flaws in code, taking advantage of programming errors, insufficient input validation, or unpatched systems to gain unauthorized access.
Compare: SQL Injection vs. Zero-Day Exploits—SQL injection exploits known vulnerability types that developers should prevent, while zero-day exploits target unknown flaws. This distinction matters: SQL injection is often a failure of secure coding practices, whereas zero-day attacks can compromise even well-maintained systems.
These attacks don't steal data—they prevent legitimate users from accessing services, targeting the "availability" component of the CIA triad.
Compare: DDoS vs. Traditional DoS—a standard denial-of-service attack comes from a single source and can be blocked by filtering that IP. Distributed attacks use thousands of sources, making simple blocking ineffective. Exam questions often test whether you understand why the "distributed" element makes these attacks particularly dangerous.
These attacks position attackers between legitimate parties, compromising confidentiality and integrity of data in transit.
These attacks attempt to bypass identity verification, gaining unauthorized access by cracking or stealing credentials.
Compare: Brute Force vs. Dictionary Attacks—brute force is comprehensive but slow (testing every possible combination), while dictionary attacks are faster but limited to known passwords. Understanding this tradeoff helps explain why complex, unique passwords defeat dictionary attacks while length defeats brute force.
Malware encompasses various software designed to harm systems—each type uses different mechanisms for infection, spread, and damage.
Compare: Viruses vs. Worms—both spread and cause damage, but viruses require human action (opening infected files) while worms spread autonomously across networks. This distinction affects both propagation speed and appropriate countermeasures.
As new technologies connect more devices, they introduce new attack surfaces with unique vulnerabilities.
Compare: IoT Vulnerabilities vs. Traditional System Threats—conventional computers receive regular security updates and run antivirus software, while many IoT devices have no update mechanism and minimal security features. This fundamental difference explains why IoT devices are disproportionately represented in botnets.
| Concept | Best Examples |
|---|---|
| Human-factor exploitation | Phishing, Social Engineering, Insider Threats |
| Software vulnerability exploitation | SQL Injection, Zero-Day Exploits |
| Availability attacks | DDoS Attacks |
| Communication interception | Man-in-the-Middle Attacks |
| Authentication bypass | Password Attacks (Brute Force, Dictionary) |
| Malicious software | Viruses, Worms, Trojans, Ransomware |
| Emerging technology risks | IoT Vulnerabilities |
| Requires user action to spread | Viruses, Trojans, Phishing |
| Spreads autonomously | Worms |
Which two threat types both exploit human psychology rather than technical vulnerabilities, and how do their attack methods differ?
Compare and contrast how SQL injection and zero-day exploits target software—what makes one preventable through secure coding practices while the other remains dangerous even in well-maintained systems?
An FRQ describes a scenario where thousands of compromised smart home devices flood a company's servers with traffic. Identify the attack type and explain why IoT devices are particularly vulnerable to being used this way.
What distinguishes a virus from a worm in terms of propagation method, and how does this difference affect the speed and scope of potential damage?
A security analyst must choose between implementing stronger password policies or deploying multi-factor authentication. Using your understanding of password attacks, explain why MFA provides superior protection regardless of password strength.