SY0-701 : Objective 2.0 Flashcards
APT
Advanced Persistent Threat (APT)
- a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data
OSINT
Open-Source Intelligence (OSINT)
- a cybersecurity tool that involves collecting and analyzing publicly available information to assess threats and identify vulnerabilities
SMS
Short Message Service (SMS)
IM
Instant Messaging (IM)
SPIM
Spam Over Internet Messaging (SPIM)
- a type of cyber security threat that involves unwanted messages sent to users of instant messaging (IM) services, SMS, or private messages on websites
MSP
Managed Service Provider (MSP)
- a third-party organization that manages your IT infrastructure remotely
EDR
Endpoint Detection and Response (EDR)
- a cybersecurity technology that helps detect and respond to threats on a network’s endpoints
XDR
Extended Detection and Response (XDR)
- a cybersecurity method that collects and analyzes data from multiple security sources to help identify and respond to threats
IPS
Intrusion Prevention System (IPS)
- a network security tool that monitors network activity for threats and takes action to prevent them
RFID
Radio Frequency Identifier (RFID)
DNS
Domain Name System (DNS)
- a critical component of the internet infrastructure that translates domain names into IP addresses
HIPS
Host-Based Intrusion Prevention System (HIPS)
- protects your system from malware and unwanted activity attempting to negatively affect your computer
HIDS
Host-Based Intrusion Detection System (HIDS)
- help organizations to monitor processes and applications running on devices such as servers and workstations
RAT
Remote Access Trojan (RAT)
SIEM
Security Information and Event Management (SIEM)
IPS
Intrusion Prevention System (IPS)
RDP
Remote Desktop Protocol (RDP)
- a network communication protocol that allows users to remotely control and operate computers
NTLM
New Technoloy LAN Manager (NTLM)
- is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users