Cyber Definitions COPY Flashcards

1
Q

Attack surface

A

The attack surface of a software-based system is the sum of the different locations (logical or physical) where a threat actor can try to enter or extract data. Reducing the attack surface as small as possible is a primary security measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AV

A

Antivirus is a type of security software that scans for, detects, blocks, and eliminates malware. AV programs will run in the background, scanning for known malware signatures and behavior patterns that may indicate the presence of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brute-force attack

A

A brute force attack is an attempt to decipher a username-password combination by trial and error. It is performed with software designed to try large samples of known username-password combinations. This method is an old attack method, but it’s still useful and popular with hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptoworm:

A

A form of malware that spreads like a worm and encrypts victims’ data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data breach

A

A data breach refers to a security event where unauthorized users steal sensitive information from an organization’s IT systems. Often, stolen data is personally identifiable information (PII) or financial information, both of which are valuable on the dark web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDR

A

Endpoint detection and response is a type of security tool that focuses on detecting and mitigating suspicious activity on devices and hosts. The value of EDR is the ability to detect advanced threats that may not have a recorded behavioral pattern or malware signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

A firewall is a network security system that monitors and controls the network traffic based on specific security rules. A firewall usually establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypot

A

A honeypot is a piece of software code designed to detect, deflect, and counteract attempts at unauthorized use of information systems. A honeypot consists of data appearing to be a legitimate part of the site but is isolated and monitored. The data seems to contain information, or a resource of value, to attackers, who are then blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPS

A

An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor a network, looking for possible malicious incidents, then capturing and reporting information about them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malware is malicious software that propagates via an email attachment or a link to a malicious website. It infects the endpoints when a user opens the attachment or clicks on the link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST

A

The National Institute of Standards and Technology (NIST) is a non-regulatory entity under the umbrella of the United States Department of Commerce. NIST Publication Series 800 provides a comprehensive listing of information security measures and controls based on extensive research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing/Spearphishing

A

A malicious email that tricks users into surrendering their user credentials. The email may appear legitimate as if coming from a bank and ask the user to reset their password. Phishing attacks take advantage of mass email programs. In a spearphishing attack, an individually crafted email targets a specific key executive or decision-maker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Ransomware is a class of malicious software that prevents the end-user from accessing a system or data. The most common form is crypto ransomware. This type of ransomware makes data or files unreadable through encryption and requires a decryption key to restore access. Another form, locker ransomware, locks access rather than encrypting data. Attackers typically request a payment, often in the form of bitcoins, to decrypt files or restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware attack

A

During a ransomware campaign, hackers often use phishing and social engineering to get a computer user to click on an attachment or a link to a malicious website. Some types of ransomware attacks, however, don’t require user action because they exploit site or computer vulnerabilities to deliver the payload. Once a system is infected, the attack will launch an on-screen notification with the ransom demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk management framework

A

: A Risk Management Framework provides a disciplined and structured process that integrates information security and risk management tasks into the system development life cycle. Essential components of an RMF include identification, measurement and assessment, mitigation, reporting and monitoring, and governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security misconfigurations

A

Security misconfigurations result from the improper implementation of security controls on devices, networks, cloud applications, firewalls, and other systems. They can lead to data breaches, unauthorized access, and other security incidents. Misconfigurations can include anything from default admin credentials, open ports, and unpatched software, to unused web pages and unprotected files.

17
Q

SOC

A

A security operations center (SOC) is a central location where cybersecurity personnel carry out threat detection and incident response processes. They employ security technologies that make up an organization’s security operations.

18
Q

SQL injection

A

A SQL injection is a technique that inserts structured query language (SQL) code into a web application database. Web applications use SQL to communicate with their databases. Attackers can use SQL injections to perform actions such as retrieval or manipulation of the database data, spoofing user identity, and executing remote commands.

19
Q

Tor

A

Tor is free and open-source software used to enable anonymous communication. Its name is derived from an acronym for the original software project name “The Onion Router” and is sometimes referred to as such. Tor directs Internet traffic through a free, worldwide, overlay network consisting of more than seven thousand relays. It conceals a user’s location and usage from anyone conducting network surveillance or traffic analysis.

20
Q

VA

A

Vulnerability assessment is the process of identifying, classifying, and prioritizing vulnerabilities in digital business systems. Assessments can focus on internal, external, or host-based vulnerabilities.

21
Q

VM

A

Vulnerability management solutions identify, track, and prioritize internal and external cybersecurity vulnerabilities. They optimize cyberattack prevention activities such as patching, upgrades, and configuration fixes.