Chapter 4: Endpoint And Application Development Security Flashcards
A metric of the upper and lower bounds of specific indicators of normal network activity
Key Risk Indicators (KRIs)
An indicator that malicious activity is occurring but is still in the early stages
Indicator of compromise (IOC)
An evaluation used for discovering an attack before it occurs
Predictive analysis
Anything that can be used freely without restrictions
Open source
A repository by which open source cybersecurity information is collected and disseminated
Public information sharing centers
Four CISCP privacy protection umbrellas include …
- Cybersecurity Information Sharing Act (CISA)
- Freedom of Information Act (FOIA)
- Traffic-Light Protocol (TLP)
- Protected Critical Infrastructure Information (PCII)
A technology that enables the exchange of cyber threat indicators between parties through computer-to-computer communication
Automated Indicator Sharing (AIS)
A language and format used to exchange cyber threat intelligence
Structured Threat Information Expression (STIX)
An application protocol for exchanging cyber threat intelligence over Hypertext Transfer Protocol Secure (HTTPS)
Trusted Automated Exchange of Intelligence (TAXII)
Proprietary information owned by an entity that has an exclusive right to it
Closed source
Organizations participating in closed source information that restrict both access to data and participation
Private information sharing centers
A repository of known vulnerabilities and information as to how they have been exploited
Vulnerability database
An illustration of cyber threats overlaid on a diagrammatic representation of a geographical area
Threat map
A storage area in which victims of an attack can upload malicious files and software code that can then be examined by others to learn more about these attacks and craft their defenses
File and code repositories
Part of the internet beyond the reach of normal search engines and is the domain of threat actors
Dark web