Cybersecurity Fundamentals Flashcards
NIST: The Official publication series for standards and guidelines
FIPS
Any potential danger to an asset
threat
A weakness in the system, design, implementation, software, or code, or the lack of a mechanism.
Vulnerability
refers to a piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system
Exploit
Referred to as the knowledge about an existing or emerging threat to assets, including networks and systems.
Threat Intelligence
An express language designed for sharing of cyber-attack information. Details can contain data such as the IP addresses or domain names of command and control servers, malware hashes, and so on.
Structured Threat Information eXpression (STIX)
An open transport mechanism that standardizes the automated exchange of cyber-threat information. TAXII was originally developed by MITRE and is now maintained by OASIS.
Trusted Automated eXchange of Indicator Information (TAXII)
Free Standardized schema for specification, capture, characterization, and communication of events of stateful properties that are observable in the operational domain.
Cyber Observable eXpression (CybOX)
An open framework for sharing threat intelligence in a machine-digestible format.
Open Indicators of Compromise (OpenIOC)
A language for the command and control of cyber-defense technologies. OpenC2 Forum was a community of cybersecurity stakeholders that was facilitated by the U.S. National Security Agency
Open Command and Control (OpenC2)
responsible for locating new files, disk space, or RAM to infect.
Search Routine
This portion of the virus is responsible for copying the virus and attaching it to a suitable host
Infection Routine
allow the attacker full control over the system. Poison Ivy is an example of this type of Trojan.
RAT
The idea behind this type of Trojan is to hide a user’s data.
Data Hiding
These Trojans (Zeus is one such example) intercept and use a victim’s banking information for financial gain. Usually, they function as a transaction authorization number (TAN) grabber, use HTML injection, or act as a form grabber. The sole purpose of these types of programs is financial gain.
E-banking