Cyber Threats Flashcards

1
Q

acceptable use policy

A

a set of wording that describes an agreement between any user and the enterprise that owns the service, application or device being accessed. The agreement usually defines both the primary permitted and prohibited activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access controls

A

rules and techniques used to manage and restrict entry to or exit from a physical, virtual or digital area though the use of permissions. Permissions are usually assigned individually to a person, device or application service to ensure accountability and traceability of usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced Persistent Threats (APTs)

A

a term used to describe the tenacious and highly evolved set of tactics used by hackers to infiltrate networks through digital devices and to then leave malicious software in place for as long as possible. The purpose can be for financial gain, brand damage or other political purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

adware

A

any computer program designed to render adverts to an end user. This type of software can be considered a form of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

air gap

A

to use some form of physical and electronic separation to ensure that activities in one area cannot impact or infect activities in another. Used in the context of cybersecurity to describe how sensitive or infected systems are physically and digitally isolated so they have no possibility of interacting with any other systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

alert status

A

An escalation flag that can be assigned to a security incident to indicate that it cannot be managed inside allowable time limits or other acceptable tolerances that are defined by an organisation’s security processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

anti malware

A

is a computer program designed to look for specific files and behaviors that indicate the presence or attempted installation of malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

application

A

a collection of functions and instructions in electronic format that resides across one or more digital devices, usually designed to create, modify, process, store, inspect and/or transmit specific types of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

assessments

A

the evaluation of a target against specific goals, objectives or other criteria through the collection of information about it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asset

A

any item (physical or digital) that has inherent value. For cybersecurity, information items that can be monetized are regarded as high-value assets due to their potential resale or blackmail value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attack

A

the occurrence of an unauthorized instrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

attack surface

A

the sum of the potential exposure area that could be used to gain unauthorised entry to any part of a digital landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

audits

A

The use of one or more independent examiners to check if a target product, service and/or location is meeting the specific required control standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

backdoor

A

a covert method of accessing software or a device that bypasses the normal authentication requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

backup

A

the process of archiving a copy of something so that it can be restored following a disruption. OR, having a redundant capability to continue a process, service or application if the primary capability is disrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

biometrics

A

the use of physical qualities and attributes as a form of identity authentication. Fingerprint scans, retina scans and facial recognition are all examples of biometrics. Biometrics is usually used only as part of a multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

black-box penetration testing

A

The term used to describe a situation in which no advance information about the technical details of a computer program has been made available to those who are checking it for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

black hat

A

a person who engages in attempts to gain unauthorized access to one or more digital devices with nefarious objectives. A hacker with unethical goals, or no perceived ethical goals

19
Q

black-listing

A

Adding a specific file type, URL or data packet to a security defense program to prevent it from being directly accessed or used. For example, a website domain can be blocked using firewall rules to ensure that no user can visit that website through customary means

20
Q

bleeding edge

A

using inventions so new, they have the likelihood to cause damage to their population before they become stable and safe

21
Q

Border Gateway Protocol (BGP)

A

Is a standard format that different systems on a network can use to share and make decisions about the path (routing) for information being transmitted

22
Q

bot

A

a computer program designed to perform specific tasks. They are usually simple, small and designed to perform fast, repetitive tasks. When the purpose of the program conflicts with an organisation’s goals and needs, a bot can be considered a form of malware.

23
Q

botnet

A

A connected set of programs designed to operate together over a network to achieve specific purposes. These purposes can be good or bad. A botnet is sometimes referred to as a zombie army.

23
Q

bot herder / bot master

A

a hacker who uses automated techniques to seek vulnerable networks and systems. The bot herder’s initial goal is to install or find bot programs that can be used to achieve a particular purpose.

24
breach notification procedure
some types of information, when suspected or known to be lost or stolen, must, by law, be reported to one or more authorities within a defined time period. Usually, this type of regulation applies to personal information.
25
brute force
the use of a systematic approach that can quickly generate large volumes of possible methods to gain unauthorised access to a computer system
26
buffer overflow
exceeding the region of electronic memory used to temporarily store data when it is being moved between locations.
27
Business Continuity Plan (BCP)
an operational document that describes how an organisation can restore its critical products or services to its customers, should a substantial evet that causes disruption to normal operations occur
28
BYOD
Bring your own device
29
CAPA
Corrective Action Preventive Action
30
Chief Information Security Officer (CISO)
a single point of accountability in any organization for ensuring that an appropriate framework for managing dangers and threats to electronic and physical information assets is operating and effective
31
cipher
The use of a key to change information into a secret or hidden format
32
clear box penetration testing (white box penetration testing)
term used to describe a situation in which the technical layout of the computer program being tested has been made available for the security test. This makes the test easier and cheaper to perform but usually results in the identification of more issues than black box penetration testing does.
33
closed system
a collection of applications, systems and devices that only have the ability to communicate with each other. No connection to any component outside the known and trusted group is permitted
34
cloud
an umbrella term used to identify any technology service that uses software and equipment not physically managed or owned by the person or organisation using it.
35
compliance
The process used to verify that governance items are being followed and to identify when they are not.
36
confidentiality
the assignment of a value to a set of information to indicate the level of secrecy and the access restrictions required to prevent unauthorised people from viewing it.
37
consent
When electronic personal information is involved, there are often legal constraints that govern how the data can be used and where the information can be viewed, stored, transmitted or otherwise processed.
38
containerization
the partitioning of software functions within a single device, system or network that is sufficient to isolate it from potential harm or from other unwanted interactions with other software in the same environment or device / the complete isolation of one technology from another. For networks, this is also referred to as network segmentation.
39
containment
a stage during an incident response when steps are taken to isolate a confirmed problem to prevent the issue from spreading to other areas
40
continuous monitoring
using technology to actively monitor the ongoing security of an application, web site or other electronic service. The purpose is to provide faster alerts when any significant infringements of security that create potential risks are detected.
41
control
a method of regulating something, often a process, technology or behavior, to achieve a desired outcome, usually resulting in the reduction of risk.c
42