Introduction To Cyber Security
Introduction To Cyber Security
Key takeaways
Understanding key technical terms and concepts used in the security field will
help prepare you for your role as a security analyst. Knowing these terms can
help you identify common threats, risks, and vulnerabilities. To explore a
variety of cybersecurity terms, visit the National Institute of Standards and
Technology glossary. Or use your browser to search for high-quality, reliable
cybersecurity glossaries from research institutes or governmental authorities.
Glossaries are available in multiple languages.
Transferable and technical cybersecurity
skills
Previously, you learned that cybersecurity analysts need to develop certain core
skills to be successful at work. Transferable skills are skills from other areas of
study or practice that can apply to different careers. Technical skills may apply to
several professions, as well; however, they typically require knowledge of specific
tools, procedures, and policies. In this reading, you’ll explore both transferable skills
and technical skills further.
Transferable skills
You have probably developed many transferable skills through life experiences;
some of those skills will help you thrive as a cybersecurity professional. These
include:
    ● Communication: As a cybersecurity analyst, you will need to communicate
      and collaborate with others. Understanding others’ questions or concerns and
      communicating information clearly to individuals with technical and
      non-technical knowledge will help you mitigate security issues quickly.
    ● Problem-solving: One of your main tasks as a cybersecurity analyst will be
      to proactively identify and solve problems. You can do this by recognizing
      attack patterns, then determining the most efficient solution to minimize risk.
      Don't be afraid to take risks, and try new things. Also, understand that it's rare
      to find a perfect solution to a problem. You’ll likely need to compromise.
    ● Time management: Having a heightened sense of urgency and prioritizing
      tasks appropriately is essential in the cybersecurity field. So, effective time
      management will help you minimize potential damage and risk to critical
      assets and data. Additionally, it will be important to prioritize tasks and stay
      focused on the most urgent issue.
    ● Growth mindset: This is an evolving industry, so an important transferable
      skill is a willingness to learn. Technology moves fast, and that's a great thing!
      It doesn't mean you will need to learn it all, but it does mean that you’ll need
      to continue to learn throughout your career. Fortunately, you will be able to
      apply much of what you learn in this program to your ongoing professional
      development.
    ● Diverse perspectives: The only way to go far is together. By having respect
      for each other and encouraging diverse perspectives and mutual respect,
      you’ll undoubtedly find multiple and better solutions to security problems.
Technical skills
There are many technical skills that will help you be successful in the cybersecurity
field. You’ll learn and practice these skills as you progress through the certificate
program. Some of the tools and concepts you’ll need to use and be able to
understand include:
    ● Programming languages: By understanding how to use programming
        languages, cybersecurity analysts can automate tasks that would otherwise
        be very time consuming. Examples of tasks that programming can be used for
        include searching data to identify potential threats or organizing and analyzing
        information to identify patterns related to security issues.
    ● Security information and event management (SIEM) tools: SIEM tools
        collect and analyze log data, or records of events such as unusual login
        behavior, and support analysts’ ability to monitor critical activities in an
        organization. This helps cybersecurity professionals identify and analyze
        potential security threats, risks, and vulnerabilities more efficiently.
    ● Intrusion detection systems (IDSs): Cybersecurity analysts use IDSs to
        monitor system activity and alerts for possible intrusions. It’s important to
        become familiar with IDSs because they’re a key tool that every organization
        uses to protect assets and data. For example, you might use an IDS to
        monitor networks for signs of malicious activity, like unauthorized access to a
        network.
    ● Threat landscape knowledge: Being aware of current trends related to
        threat actors, malware, or threat methodologies is vital. This knowledge allows
        security teams to build stronger defenses against threat actor tactics and
        techniques. By staying up to date on attack trends and patterns, security
        professionals are better able to recognize when new types of threats emerge
        such as a new ransomware variant.
    ● Incident response: Cybersecurity analysts need to be able to follow
        established policies and procedures to respond to incidents appropriately. For
        example, a security analyst might receive an alert about a possible malware
        attack, then follow the organization’s outlined procedures to start the incident
        response process. This could involve conducting an investigation to identify
        the root issue and establishing ways to remediate it.
CompTIA Security+
In addition to gaining skills that will help you succeed as a cybersecurity
professional, the Google Cybersecurity Certificate helps prepare you for the
CompTIA Security+ exam, the industry leading certification for cybersecurity roles.
You’ll earn a dual credential when you complete both, which can be shared with
potential employers. After completing all eight courses in the Google Cybersecurity
Certificate, you will unlock a 30% discount for the CompTIA Security+ exam and
additional practice materials.
Key takeaways
Understanding the benefits of core transferable and technical skills can help prepare
you to successfully enter the cybersecurity workforce. Throughout this program,
you’ll have multiple opportunities to develop these and other key cybersecurity
analyst skills.
Phishing
Phishing is the use of digital communications to trick people into revealing sensitive
data or deploying malicious software.
Some of the most common types of phishing attacks today include:
   ● Business Email Compromise (BEC): A threat actor sends an email
      message that seems to be from a known source to make a seemingly
      legitimate request for information, in order to obtain a financial advantage.
   ● Spear phishing: A malicious email attack that targets a specific user or group
      of users. The email seems to originate from a trusted source.
   ● Whaling: A form of spear phishing. Threat actors target company executives
      to gain access to sensitive data.
   ● Vishing: The exploitation of electronic voice communication to obtain
      sensitive information or to impersonate a known source.
   ● Smishing: The use of text messages to trick users, in order to obtain
      sensitive information or to impersonate a known source.
Malware
Malware is software designed to harm devices or networks. There are many types
of malware. The primary purpose of malware is to obtain money, or in some cases,
an intelligence advantage that can be used against a person, an organization, or a
territory.
Some of the most common types of malware attacks today include:
   ● Viruses: Malicious code written to interfere with computer operations and
     cause damage to data and software. A virus needs to be initiated by a user
     (i.e., a threat actor), who transmits the virus via a malicious attachment or file
     download. When someone opens the malicious attachment or download, the
     virus hides itself in other files in the now infected system. When the infected
     files are opened, it allows the virus to insert its own code to damage and/or
     destroy data in the system.
   ● Worms: Malware that can duplicate and spread itself across systems on its
     own. In contrast to a virus, a worm does not need to be downloaded by a
     user. Instead, it self-replicates and spreads from an already infected computer
     to other devices on the same network.
   ● Ransomware: A malicious attack where threat actors encrypt an
     organization's data and demand payment to restore access.
   ● Spyware: Malware that’s used to gather and sell information without consent.
     Spyware can be used to access devices. This allows threat actors to collect
     personal data, such as private emails, texts, voice and image recordings, and
     locations.
Social Engineering
Social engineering is a manipulation technique that exploits human error to gain
private information, access, or valuables. Human error is usually a result of trusting
someone without question. It’s the mission of a threat actor, acting as a social
engineer, to create an environment of false trust and lies to exploit as many people
as possible.
Some of the most common types of social engineering attacks today include:
    ● Social media phishing: A threat actor collects detailed information about
       their target from social media sites. Then, they initiate an attack.
    ● Watering hole attack: A threat actor attacks a website frequently visited by a
       specific group of users.
    ● USB baiting: A threat actor strategically leaves a malware USB stick for an
       employee to find and install, to unknowingly infect a network.
    ● Physical social engineering: A threat actor impersonates an employee,
       customer, or vendor to obtain unauthorized access to a physical location.
Key takeaways
In this reading, you learned about some common attacks and their impacts. You also
learned about social engineering and why it’s so successful. While this is only a brief
introduction to attack types, you will have many opportunities throughout the
program to further develop your understanding of how to identify and defend against
cybersecurity attacks.
Attack types
Password attack
A password attack is an attempt to access password-secured devices, systems,
networks, or data. Some forms of password attacks that you’ll learn about later in the
certificate program are:
   ● Brute force
   ● Rainbow table
Password attacks fall under the communication and network security domain.
Physical attack
A physical attack is a security incident that affects not only digital but also physical
environments where the incident is deployed. Some forms of physical attacks are:
   ● Malicious USB cable
   ● Malicious flash drive
   ● Card cloning and skimming
Physical attacks fall under the asset security domain.
Supply-chain attack
A supply-chain attack targets systems, applications, hardware, and/or software to
locate a vulnerability where malware can be deployed. Because every item sold
undergoes a process that involves third parties, this means that the security breach
can occur at any point in the supply chain. These attacks are costly because they
can affect multiple organizations and the individuals who work for them.
Supply-chain attacks can fall under several domains, including but not limited to the
security and risk management, security architecture and engineering, and security
operations domains.
Cryptographic attack
A cryptographic attack affects secure forms of communication between a sender
and intended recipient. Some forms of cryptographic attacks are:
   ● Birthday
   ● Collision
   ● Downgrade
Cryptographic attacks fall under the communication and network security domain.
Key takeaways
The eight CISSP security domains can help an organization and its security team
fortify against and prepare for a data breach. Data breaches range from simple to
complex and fall under one or more domains. Note that the methods of attack
discussed are only a few of many. These and other types of attacks will be
discussed throughout the certificate program.
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a
threat actor is any person or group who presents a security risk. In this reading,
you’ll learn about different types of threat actors. You will also learn about their
motivations, intentions, and how they’ve influenced the security industry.
Threat actor types
Advanced persistent threats
Advanced persistent threats (APTs) have significant expertise accessing an
organization's network without authorization. APTs tend to research their targets
(e.g., large corporations or government entities) in advance and can remain
undetected for an extended period of time. Their intentions and motivations can
include:
    ● Damaging critical infrastructure, such as the power grid and natural resources
    ● Gaining access to intellectual property, such as trade secrets or patents
Insider threats
Insider threats abuse their authorized access to obtain data that may harm an
organization. Their intentions and motivations can include:
   ● Sabotage
   ● Corruption
   ● Espionage
   ● Unauthorized data access or leaks
Hacktivists
Hacktivists are threat actors that are driven by a political agenda. They abuse digital
technology to accomplish their goals, which may include:
   ● Demonstrations
   ● Propaganda
   ● Social change campaigns
   ● Fame
Hacker types
A hacker is any person who uses computers to gain access to computer systems,
networks, or data. They can be beginner or advanced technology professionals who
use their skills for a variety of reasons. There are three main categories of hackers:
   ● Authorized hackers are also called ethical hackers. They follow a code of
      ethics and adhere to the law to conduct organizational risk evaluations. They
      are motivated to safeguard people and organizations from malicious threat
      actors.
   ● Semi-authorized hackers are considered researchers. They search for
      vulnerabilities but don’t take advantage of the vulnerabilities they find.
   ● Unauthorized hackers are also called unethical hackers. They are malicious
     threat actors who do not follow or respect the law. Their goal is to collect and
     sell confidential data for financial gain.
Note: There are multiple hacker types that fall into one or more of these three
categories.
New and unskilled threat actors have various goals, including:
   ● To learn and enhance their hacking skills
   ● To seek revenge
   ● To exploit security weaknesses by using existing malware, programming
      scripts, and other tactics
Other types of hackers are not motivated by any particular agenda other than
completing the job they were contracted to do. These types of hackers can be
considered unethical or ethical hackers. They have been known to work on both
illegal and legal tasks for pay.
There are also hackers who consider themselves vigilantes. Their main goal is to
protect the world from unethical hackers.
Key takeaways
Threat actors are defined by their malicious intent and hackers are defined by their
technical skills and motivations. Understanding their motivations and intentions will
help you be better prepared to protect your organization and the people it serves
from malicious attacks carried out by some of these individuals and groups.
Key takeaways
As a future security professional, ethics will play a large role in your daily work.
Understanding ethics and laws will help you make the correct choices if and when
you encounter a security threat or an incident that results in a breach.
Glossary terms from module 3
Terms and definitions from Course 1, Module 3
Asset: An item perceived as having value to an organization
Availability: The idea that data is accessible to those who are authorized to access
it
Compliance: The process of adhering to internal standards and external regulations
Confidentiality: The idea that only authorized users can access specific assets or
data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
Hacktivist: A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients' health information
Integrity: The idea that the data is correct, authentic, and reliable
National Institute of Standards and Technology (NIST) Cyber Security
Framework (CSF): A voluntary framework that consists of standards, guidelines,
and best practices to manage cybersecurity risk
Privacy protection: The act of safeguarding personal information from
unauthorized use
Protected health information (PHI): Information that relates to the past, present, or
future physical or mental health or condition of an individual
Security architecture: A type of security design composed of multiple components,
such as tools and processes, that are used to protect an organization from risks and
external threats
Security controls: Safeguards designed to reduce specific security risks
Security ethics: Guidelines for making appropriate decisions as a security
professional
Security frameworks: Guidelines used for building plans to help mitigate risk and
threats to data and privacy
Security governance: Practices that help support, define, and direct security efforts
of an organization
Sensitive personally identifiable information (SPII): A specific type of PII that
falls under stricter handling guidelines
                                   Module 4
Playbooks
A playbook is a manual that provides details about any operational action, such as
how to respond to a security incident. Organizations usually have multiple playbooks
documenting processes and procedures for their teams to follow. Playbooks vary
from one organization to the next, but they all have a similar purpose: To guide
analysts through a series of steps to complete specific security-related tasks.
For example, consider the following scenario: You are working as a security analyst
for an incident response firm. You are given a case involving a small medical
practice that has suffered a security breach. Your job is to help with the forensic
investigation and provide evidence to a cybersecurity insurance company. They will
then use your investigative findings to determine whether the medical practice will
receive their insurance payout.
In this scenario, playbooks would outline the specific actions you need to take to
conduct the investigation. Playbooks also help ensure that you are following proper
protocols and procedures. When working on a forensic case, there are two
playbooks you might follow:
    ● The first type of playbook you might consult is called the chain of custody
        playbook. Chain of custody is the process of documenting evidence
        possession and control during an incident lifecycle. As a security analyst
        involved in a forensic analysis, you will work with the computer data that was
        breached. You and the forensic team will also need to document who, what,
        where, and why you have the collected evidence. The evidence is your
     responsibility while it is in your possession. Evidence must be kept safe and
     tracked. Every time evidence is moved, it should be reported. This allows all
     parties involved to know exactly where the evidence is at all times.
   ● The second playbook your team might use is called the protecting and
     preserving evidence playbook. Protecting and preserving evidence is the
     process of properly working with fragile and volatile digital evidence. As a
     security analyst, understanding what fragile and volatile digital evidence is,
     along with why there is a procedure, is critical. As you follow this playbook,
     you will consult the order of volatility, which is a sequence outlining the
     order of data that must be preserved from first to last. It prioritizes volatile
     data, which is data that may be lost if the device in question powers off,
     regardless of the reason. While conducting an investigation, improper
     management of digital evidence can compromise and alter that evidence.
     When evidence is improperly managed during an investigation, it can no
     longer be used. For this reason, the first priority in any investigation is to
     properly preserve the data. You can preserve the data by making copies and
     conducting your investigation using those copies.
Key takeaways
In this reading, you learned about a few tools a security analyst may have in their
toolkit, depending on where they work. You also explored two important types of
playbooks: chain of custody and protecting and preserving evidence. However,
these are only two procedures that occur at the beginning of a forensic investigation.
If forensic investigations interest you, you are encouraged to further explore this
career path or security practice. In the process, you may learn about forensic tools
that you want to add to your toolkit. While all of the forensic components that make
up an investigation will not be covered in this certificate program, some forensic
concepts will be discussed in later courses.
Operating systems
An operating system is the interface between computer hardware and the user.
Linux®, macOS®, and Windows are operating systems. They each offer different
functionality and user experiences.
Previously, you were introduced to Linux as an open-source operating system.
Open source means that the code is available to the public and allows people to
make contributions to improve the software. Linux is not a programming language;
however, it does involve the use of a command line within the operating system. A
command is an instruction telling the computer to do something. A command-line
interface is a text-based user interface that uses commands to interact with the
computer. You will learn more about Linux, including the Linux kernel and GNU, in a
later course.
Web vulnerability
A web vulnerability is a unique flaw in a web application that a threat actor could
exploit by using malicious code or behavior, to allow unauthorized access, data theft,
and malware deployment.
To stay up-to-date on the most critical risks to web applications, review the Open
Web Application Security Project (OWASP) Top 10.
Antivirus software
Antivirus software is a software program used to prevent, detect, and eliminate
malware and viruses. It is also called anti-malware. Depending on the type of
antivirus software, it can scan the memory of a device to find patterns that indicate
the presence of malware.
Encryption
Encryption makes data unreadable and difficult to decode for an unauthorized user;
its main goal is to ensure confidentiality of private data. Encryption is the process of
converting data from a readable format to a cryptographically encoded format.
Cryptographic encoding means converting plaintext into secure ciphertext.
Plaintext is unencrypted information and secure ciphertext is the result of
encryption.
Note: Encoding and encryption serve different purposes. Encoding uses a public
conversion algorithm to enable systems that use different data representations to
share information.
Penetration testing
Penetration testing, also called pen testing, is the act of participating in a simulated
attack that helps identify vulnerabilities in systems, networks, websites, applications,
and processes. It is a thorough risk assessment that can evaluate and identify
external and internal threats as well as weaknesses.
Key takeaways
In this reading, you learned more about programming and operating systems. You
were also introduced to several new tools and processes. Every organization selects
their own set of tools. Therefore, the more tools you know, the more valuable you
are to an organization. Tools help security analysts complete their tasks more
efficiently and effectively.
Description: Google Drive and Dropbox offer similar features that allow you to store
your professional documentation on a cloud platform. Both options also have
file-sharing features, so you can easily share your portfolio documents with potential
employers. Any additions or changes you make to a document within that folder will
be updated automatically for anyone with access to your portfolio.
Similar to a documents folder, keeping your Google Drive or Dropbox-based portfolio
well organized will be helpful as you begin or progress through your career.
Setup: To learn how to upload and share files on these applications, visit the Google
Drive and Dropbox websites for more information.
Description: Google Sites and similar website hosting options have a variety of
easy-to-use features to help you present your portfolio items, including customizable
layouts, responsive webpages, embedded content capabilities, and web publishing.
Responsive webpages automatically adjust their content to fit a variety of devices
and screen sizes. This is helpful because potential employers can review your
content using any device and your media will display just as you intend. When
you’re ready, you can publish your website and receive a unique URL. You can add
this link to your resume so hiring managers can easily access your work.
Setup: To learn how to create a website in Google Sites, visit the Google Sites
website.
Portfolio projects
As previously mentioned, you will have multiple opportunities throughout the
certificate program to develop items to include in your portfolio. These opportunities
include:
    ● Drafting a professional statement
    ● Conducting a security audit
    ● Analyzing network structure and security
    ● Using Linux commands to manage file permissions
    ● Applying filters to SQL queries
    ● Identifying vulnerabilities for a small business
    ● Documenting incidents with an incident handler’s journal
    ● Importing and parsing a text file in a security-related scenario
    ● Creating or revising a resume
Note: Do not include any private, copyrighted, or proprietary documents in your
portfolio. Also, if you use one of the sites described in this reading, keep your site
set to “private” until it is finalized.
Key takeaways
Now that you’re aware of some options for creating and hosting a professional
portfolio, you can consider these as you develop items for your portfolio throughout
the certificate program. The more proactive you are about creating a polished
portfolio, the higher your chances of impressing a potential employer and obtaining a
new job opportunity in the cybersecurity profession.
                 Professional statement exemplar
    Fictional persona:
    Following is a fictional persona that may represent someone interested in
    becoming a cybersecurity analyst.
    Melodie is a high school graduate and her strongest subjects in school were
    math and science. She enjoys learning and excelled in school. She likes
    creating spreadsheets to organize everyday tasks. She also likes analyzing
    complex tasks. Melodie has a passion for technology and enjoys helping
    others. She is interested in the field of security but has no previous
    experience. She wants an entry-level cybersecurity position that will utilize
    her drive and thirst for knowledge. She believes the Google Cybersecurity
    Certificate will make her a better candidate and will help her develop the
    professional skills she lacks.
    Fictional persona’s draft professional statement:
    My name is Melodie. I am driven and passionate about safeguarding
    people’s security, including their financial well being. I enjoy working with
    technology and analyzing and solving complex problems.
A
Adversarial artificial intelligence: A technique that manipulates artificial intelligence
(AI) and machine learning (ML) technology to conduct attacks more efficiently
Antivirus software: A software program used to prevent, detect, and eliminate
malware and viruses
Asset: An item perceived as having value to an organization
Availability: The idea that data is accessible to those who are authorized to access it
B
Business Email Compromise (BEC): A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage
C
Cloud security: The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users
Compliance: The process of adhering to internal standards and external regulations
Computer virus: Malicious code written to interfere with computer operations and
cause damage to data and software
Confidentiality: Only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
Cryptographic attack: An attack that affects secure forms of communication between a
sender and intended recipient
Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation
D
Database: An organized collection of information or data
Data point: A specific piece of information
H
Hacker: Any person who uses computers to gain access to computer systems,
networks, or data
Hacktivist: A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients’ health information
I
Integrity: The idea that the data is correct, authentic, and reliable
Internal threat: A current or former employee, external vendor, or trusted partner who
poses a security risk
Intrusion detection system (IDS): An application that monitors system activity and
alerts on possible intrusions
L
Linux: An open-source operating system
Log: A record of events that occur within an organization’s systems
M
Malware: Software designed to harm devices or networks
N
National Institute of Standards and Technology (NIST) Cyber Security Framework
(CSF): A voluntary framework that consists of standards, guidelines, and best practices
to manage cybersecurity risk
Network protocol analyzer (packet sniffer): A tool designed to capture and analyze
data traffic within a network
Network security: The practice of keeping an organization's network infrastructure
secure from unauthorized access
O
Open Web Application Security Project (OWASP): A non-profit organization focused
on improving software security
Order of volatility: A sequence outlining the order of data that must be preserved from
first to last
P
Password attack: An attempt to access password secured devices, systems, networks,
or data
Personally identifiable information (PII): Any information used to infer an individual’s
identity
Phishing: The use of digital communications to trick people into revealing sensitive
data or deploying malicious software
Physical attack: A security incident that affects not only digital but also physical
environments where the incident is deployed
Physical social engineering: An attack in which a threat actor impersonates an
employee, customer, or vendor to obtain unauthorized access to a physical location
Privacy protection: The act of safeguarding personal information from unauthorized
use
Programming: A process that can be used to create a specific set of instructions for a
computer to execute tasks
Protected health information (PHI): Information that relates to the past, present, or
future physical or mental health or condition of an individual
Protecting and preserving evidence: The process of properly working with fragile and
volatile digital evidence
S
Security architecture: A type of security design composed of multiple components,
such as tools and processes, that are used to protect an organization from risks and
external threats
Security controls: Safeguards designed to reduce specific security risks
Security ethics: Guidelines for making appropriate decisions as a security professional
Security frameworks: Guidelines used for building plans to help mitigate risk and
threats to data and privacy
Security governance: Practices that help support, define, and direct security efforts of
an organization
Security information and event management (SIEM): An application that collects and
analyzes log data to monitor critical activities in an organization
Security posture: An organization’s ability to manage its defense of critical assets and
data and react to change
Sensitive personally identifiable information (SPII): A specific type of PII that falls
under stricter handling guidelines
Social engineering: A manipulation technique that exploits human error to gain private
information, access, or valuables
Social media phishing: A type of attack where a threat actor collects detailed
information about their target on social media sites before initiating the attack
Spear phishing: A malicious email attack targeting a specific user or group of users,
appearing to originate from a trusted source
SQL (Structured Query Language): A programming language used to create, interact
with, and request information from a database
Supply-chain attack: An attack that targets systems, applications, hardware, and/or
software to locate a vulnerability where malware can be deployed
T
Technical skills: Skills that require knowledge of specific tools, procedures, and
policies
Threat: Any circumstance or event that can negatively impact assets
Threat actor: Any person or group who presents a security risk
Transferable skills: Skills from other areas that can apply to different careers
U
USB baiting: An attack in which a threat actor strategically leaves a malware USB stick
for an employee to find and install to unknowingly infect a network
V
Virus: refer to “computer virus”
Vishing: The exploitation of electronic voice communication to obtain sensitive
information or to impersonate a known source
W
Watering hole attack: A type of attack when a threat actor compromises a website
frequently visited by a specific group of users