Chapter 2 Flashcards
Script Kiddie
A term for people who use hacking techniques but have limited skills.
Hacktivists
Use hacking techniques to accomplish some activist goal.
Insider Attacks
Occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack against the organization.
Threat Intelligence
The set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment.
IoC (Indicators of Compromise)
The telltale signs that an attack has taken place and may include evidence left behind by the attacker.
Assessing Threat Intelligence
Timely, accurate, and relevant are the factors used to determine an actual threat.
STIX (Structured Threat Information eXpression)
An XML language used to manage and standardize threat and indicator information.