Cyberattacks And Cybersecurity - Key Terms Flashcards

1
Q

A network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time (weeks or even months).

A

Advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.

A

Blended threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.

A

Bring Your Own Device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

A

Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

A

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refers to confidentiality, integrity, and availability.

A

CIA security triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

A

Computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A law that specifies that it is legal to spam, provided the messages meet a few basic requirements—spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.

A

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

A

Cyberespionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals.

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.”

A

Department of Homeland Security (DHS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.

A

Disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

A

Distributed denial-of-service (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of scrambling messages or data in such a way that only authorized parties can read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable by those without the encryption key needed to decipher it.

A

Encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attack on an information system that takes advantage of a particular system vulnerability.

A

Exploit

19
Q

Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

A

Intrusion detection system (IDS)

20
Q

A type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time.

A

Logic bomb

21
Q

A company that monitors, manages, and maintains computer and network security for other organizations.

A

Managed security service provider (MSSP)

22
Q

Business processes that are more pivotal to continued operations and goal attainment than others.

A

Mission-critical process

23
Q

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

A

Next-generation firewall (NGFW)

24
Q

The act of fraudulently using email to try to get the recipient to reveal personal data.

A

Phishing

25
Q

Malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.

A

Ransomware

26
Q

A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

A

Reasonable assurance

27
Q

The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.

A

Risk assessment

28
Q

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.

A

Rootkit

29
Q

An evaluation of whether an organization has a well-considered security policy in place and if it is being followed.

A

Security audit

30
Q

An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

A

Security policy

31
Q

Another variation of phishing that involves the use of texting.

A

Smishing

32
Q

The use of email systems to send unsolicited email to large numbers of people.

A

Spam

33
Q

A variation of phishing in which the phisher sends fraudulent emails to a certain organization’s employees.

A

Spear phishing

34
Q

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

A

Transport Layer Security (TLS)

35
Q

A seemingly harmless program in which malicious code is hidden.

A

Trojan horse

36
Q

Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.

A

U.S. Computer Emergency Readiness Team (US-CERT)

37
Q

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

A

Virus

38
Q

A specific sequence of bytes that indicates to antivirus software that a specific virus is present.

A

Virus signature

39
Q

Similar to smishing except that the victims receive a voice-mail message telling them to call a phone number or access a website.

A

Vishing

40
Q

A harmful program that resides in the active memory of the computer and duplicates itself.

A

Worm

41
Q

A cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.

A

Zero-day exploit

42
Q

A computer that is part of a botnet and that is controlled by a hacker without the knowledge or consent of the owner.

A

Zombie

43
Q

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

A

Firewall