Cyberattacks And Cybersecurity - Key Terms Flashcards
A network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time (weeks or even months).
Advanced persistent threat (APT)
Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.
Antivirus software
A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.
Blended threat
A large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
Botnet
A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.
Bring Your Own Device (BYOD)
A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.
Business continuity plan
Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Refers to confidentiality, integrity, and availability.
CIA security triad
A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.
Computer forensics
A law that specifies that it is legal to spam, provided the messages meet a few basic requirements—spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act
The deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
Cyberespionage
The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals.
Cyberterrorism
A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.”
Department of Homeland Security (DHS)
A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.
Disaster recovery plan
An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
Distributed denial-of-service (DDoS) attack
The process of scrambling messages or data in such a way that only authorized parties can read it.
Encryption
A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable by those without the encryption key needed to decipher it.
Encryption key