Cloud Security Terms Flashcards
Account Takeover
A type of cyber attack in which the hacker spends extended periods of time dormant in a compromised account, spreading silently within the organization through internal messages until they have access to information that is valuable to them. They may use the account to attack other organizations.
Advanced Persistent Threat (APT)
The attack in which the attacker gains access to an account or network and remains undetected after the initial breach. The “advanced” describes the initial breach technique (phishing or malware) that was able to evade the victim’s security. The attack is “persistent” because the attacker continues to carry out the attack through reconnaissance and internal spread long after the initial breach.
Advanced Threat Protection (Microsoft ATP)
Safe Links: replaces each URL, checking the site before redirecting the users.
Safe Attachments: scanning attachments for malware
Spoof Intelligence: analyzes external emails that match your domain.
Anti-phishing Filters: looks for signs of incoming phishing attacks.
Anomaly
A type of behavior or action that seems abnormal when observed in the context of an organization and a user’s historical activity. It is typically analyzed using some sort of machine-learning algorithm that builds a profile based upon historical event information including login locations and times, data-transfer behavior and email message patterns. Anomalies are often a sign that an account is compromised.
API Attack
An API-based attack typically involves fooling the user into approving an API connection with a phishing attack. Once granted the API token, the attacker has almost complete access and control, even if the user changes the account password. To break the connection, the user must manually revoke the API token.
Behavioral Analysis
A security measure in which a file’s behaviour is monitored and analyzed in an isolated environment in order to see if it contains hidden malicious functions or is communicating with an unknown third party.
Brand Impersonation
A method of phishing attack in which the perpetrator spoofs the branding of a well-known company to fool the recipient into entering credentials, sharing confidential information, transferring money or clicking on a malicious link. An example might be a forged email that looks like it is from a social media company asking to verify a password.
Breach Response
A form of security that remedies the damage caused by a breach. For example, changing passwords, revoking API tokens, resetting permissions for shared documents, enabling multi-factor-authentication, restoring lost or edited documents, documenting and classifying leaked information, and identifying potential pathways to collateral compromise.
CASB - Cloud Access Security Broker
Monitors and controls the cloud applications that an organization’s employees might use. Typically, the control is enforced by routing web
traffic through a forward- or reverse-proxy. Good for managing Shadow IT and limiting employees’ use of certain SaaS or the activity within those SaaS but do not monitor third-party activity in the cloud–i.e. shared documents or email.
CAT - Cloud Access Trojan
Any method of accessing a cloud account without the use of a username and password, for example, a malicious user syncing a desktop app, forwarding all email to an external account, connecting a malicious script or simply authorizing a backup service for which they have full access. In each case, the attacker needs only momentary access, often gained through a phishing attack.
Cloud Messaging Apps
Cloud-based communication services that include email but are used by companies for internal communication but also might include trusted partners. Often employees imbue more trust in these apps even though they are just as capable of distributing malware or phishing messages.
Cloudify
Taking a software that was created for on-premise or datacenter usage, wrapping it with an API container and converting it to a cloud service. For example, taking the malware analysis blade from a perimeter appliance and adapting it so that it can be configured and scaled without the need for direct management. This also includes the automation of software licensing and version control.
Compromised Account
An account which has been accessed and is possibly controlled by an outside party for malicious reasons. This can be done either via API connection or by gaining credentials to the account from a leak or phishing email. Typically, the goal of the attacker is to remain undetected, in order to use it as a base for further attacks.
Data Classification
A security and compliance measure in which all of an organization’s documents are scanned and categorized based on their sensitivity and then are automatically encrypted or adjusted to the correct sharing level permissions. For example, documents containing customer information or employee social security numbers would be classified as highly sensitive and encrypted whereas an external facing white paper would be classified as non-sensitive and likely not encrypted.
DLP (Data Leak Prevention or Data Loss Prevention)
A type of security that prevents sensitive data, usually files, from being shared outside the organization or with unauthorized individuals within the organization. This is done usually through policies that encrypt data or control sharing settings.