google_cyberpunk_20240321024757 Flashcards
Maleware
A software designed to harm devices or networks
Virus
A malware program that modifies their computer programs by inserting its own code to damage and/or destroy data
Worm
Malware that self - replicates spreading across the network and infecting computers
Ransomware
A malicious attack during which threat actors encrypt an organization’s data and demands payment to restore access
Spyware
Malicious software installed on a users computer without their permission, which is used to spy on and steal user data
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
Spear phishing
A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source
Whaling
A form of spear phishing during which threat actors target executives in order to gain access to sensitive data
Business email compromise (BEC)
An attack in which a threat actor impersonates a known source to obtain a financial advantage
Example of: Phishing
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
Social engineering
A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data
Social media phishing
An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack
Example of: Social engineering
Watering hole attack
An attack in which a threat actor compromises a website frequently visited by a specific group of users
Example of: Social engineering
Physical social engineering
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
Example of: Social engineering
USB baiting
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network
Example of: Social engineering
1 - Security and Risk Management
defining security goals and objectives, risk mitigation, compliance, business continuity, and the law
2 - Asset Security
securing digital and physical assets
3 - Architecture and engineering
optimizing data security by ensuring effective tools, systems, and processes are in place
4 - Communication and network security
managing and securing physical networks and wireless communications
5 - Identity and access management,
Identity and access management focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications
6 - Security assessment and testing,
conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities
7 - Security operations, and software development security.
investigations and implementing preventative measures
8 - Software development security.
Secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.
Antivirus software
A software program used to prevent, detect, and eliminate malware and viruses
Security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization
Splunk
`A data analysis platform
Chronicle
is a cloud-native SIEM tool that stores security data for search and analysis. Cloud-native means that Chronicle allows for fast delivery of new features.
Network protocol analyzer (packet sniffer)
A tool designed to capture and analyze data traffic within a network
chain of custody playbook
process of documenting evidence possession and control during an incident lifecycle
protecting and preserving evidence playbook
properly working with fragile and volatile digital evidence
order of volatility
a sequence outlining the order of data that must be preserved from first to last