Terms Flashcards

1
Q

Advanced persistent threats

A

Sophisticated hacker attack that leaves behind malware. Goal is to remain in the system as long as possible before being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Black hat

A

Person who attempts to gain access to a computer system with criminal intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Penetration Testing

A

White Box - Tester has been provided range info
Black Box -No information has been given to the testers
Grey Box - Tester has been provided some limited info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bleeding edge tech

A

Tech so new they are likely to cause damage and become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bot

A

Computer program designed for a specific task. Hacker using a bot is called a bot herder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dark web

A

Websites that hide their server location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDos

A

Distributed denial of service. Cyber attacks designed to disrupt people’s use of computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethical hacking

A

Use of white hats to test venerability of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exfiltrate

A

Move data with a degree of secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet of things

A

Incorporation of everyday items into a network. Lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kill chain

A

Defense model that uses structure of attack to build a defense strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Malicious software used by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Moore’s law

A

Over the history of computing, the processing power of computer doubles every 2 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Polymorphic malware

A

Malware that can change attributes to help avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

Malware that holds data hostage until money is paid to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Residual risk

A

Risk remaining after controls are put in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Resilience

A

The ability to remain functional in the face of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spear phishing

A

Email that targets a specific person or group that pretends to come from a legit source, i.e. boss to staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spoofing

A

Concealing the true space of information by impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Spyware

A

Malware that gathers information and transmits data to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

White hat

A

Security specialist who breaks into system by invitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SLAM

A

Simultaneous localization and mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Kinect

A

Sensing device that could be used to solve the Slam issue in robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Waze

A

Uses social networking to provide real time traffic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Fin tech
Financial technology (Venmo, cash app, Apple Pay)
26
Reg tech
Technology that automates compliance with regulations or identifies potential violations
27
Block chain
Distributed open ledger
28
Digital risk
Digital connectedness increase risk
29
Risk Mgt Framework
Essential steps in the implementation and support of rm process
30
Risk architecture
Communications and reporting structure
31
Risk identification
What might happen
32
Risk analysis
How might risk happen
33
Risk appetite
Determining the acceptable level of risk for the org
34
Risk tolerance
Line in the sand, level of risk past what can be absorbed by the org
35
Business continuity
Plan to continue operations after an incident
36
Loss control
Range of activities to reduce potential of risk
37
Organizational resilience
Ability to deal with risk
38
General purpose technology
GPT- Tech that is pervasive, improves over time, able to span new innovation Example autonomous cars (combustion engine with digital tech)
39
Recombinant innovation
Combine or recombine ideas to come up with a new tech | Waze
40
Internet of things
Network of manufactured good that can send and receive data over the internet. (Appliances)
41
RASP
Risk Architecture, risk Strategy, risk Protocols
42
Risk
The effect of uncertainty on objectives
43
Loss Prevention
identify treatments that help prevent hazards, reduce the likelihood.
44
Digitization Risk
Risk of digitizing business
45
Cyber Risk
Risk of protecting digitized data
46
Red Team
Group of penetration testers by ethical hackers
47
Hacker
Person who engages in unauthorized access of data
48
Malware
Malicious software than can be inserted into digital devices
49
Patch Management
Controlled process used to deploy critical software updates
50
BYOD
Bring your own devices - increase risk of data
51
Threat Actors
Hacker type - whistle blowers/anti business groups, more interested in control than money
52
Zero-Day attack
First attack with a new malware, anti-malware are not equipped to identify this exploit
53
EGGE Cyber Security Team
Design for a good cyber security team 1) ethically diverse 2) geographically diverse 3) gender diverse 4) educationally diverse
54
Containerization
Isolate sections of a device
55
Cyber Defense Points
digital locations where cyber security controls can be added
56
Single point of accountability
All critical data processes that have a single point of accountability
57
Social Engineering
Manipulating people through personal interaction to gain access
58
Decapitation
Prevents device from communicating
59
DLP
Data Loss Prevention
60
IDS
Intrusion detection system - monitors data passing
61
Defense In Depth Strategy
multiple layers, check and balances
62
Honey pot
Trap (danger as the victim needs to engage with the hacker)
63
Polymorphic
Malware that can change to avoid detection
64
SSL
Secure Socket layers - secure encrypted protocol to prevent content from being intercepted
65
Drive by download
unintended download of virus through the internet
66
Mobile Device Management
MDM - Tech used to secure devices, remote wipe
67
SIEM
Security Incident & Event Mgt (process and capabilities required to clean up security incident)
68
Security Incident vs Security Event
Incident is major and event is a minor disruption
69
Augmented Reality
Overlaying of a virtual digital layer onto a view of the real world.
70
Corporate Governance
Set of relationships between an company, management, the board, shareholders, and other stakeholders