Terms Flashcards

1
Q

Advanced persistent threats

A

Sophisticated hacker attack that leaves behind malware. Goal is to remain in the system as long as possible before being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Black hat

A

Person who attempts to gain access to a computer system with criminal intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Penetration Testing

A

White Box - Tester has been provided range info
Black Box -No information has been given to the testers
Grey Box - Tester has been provided some limited info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bleeding edge tech

A

Tech so new they are likely to cause damage and become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bot

A

Computer program designed for a specific task. Hacker using a bot is called a bot herder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dark web

A

Websites that hide their server location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDos

A

Distributed denial of service. Cyber attacks designed to disrupt people’s use of computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethical hacking

A

Use of white hats to test venerability of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exfiltrate

A

Move data with a degree of secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet of things

A

Incorporation of everyday items into a network. Lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kill chain

A

Defense model that uses structure of attack to build a defense strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Malicious software used by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Moore’s law

A

Over the history of computing, the processing power of computer doubles every 2 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Polymorphic malware

A

Malware that can change attributes to help avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

Malware that holds data hostage until money is paid to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Residual risk

A

Risk remaining after controls are put in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Resilience

A

The ability to remain functional in the face of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spear phishing

A

Email that targets a specific person or group that pretends to come from a legit source, i.e. boss to staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spoofing

A

Concealing the true space of information by impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Spyware

A

Malware that gathers information and transmits data to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

White hat

A

Security specialist who breaks into system by invitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SLAM

A

Simultaneous localization and mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Kinect

A

Sensing device that could be used to solve the Slam issue in robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Waze

A

Uses social networking to provide real time traffic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fin tech

A

Financial technology (Venmo, cash app, Apple Pay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Reg tech

A

Technology that automates compliance with regulations or identifies potential violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Block chain

A

Distributed open ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Digital risk

A

Digital connectedness increase risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Risk Mgt Framework

A

Essential steps in the implementation and support of rm process

30
Q

Risk architecture

A

Communications and reporting structure

31
Q

Risk identification

A

What might happen

32
Q

Risk analysis

A

How might risk happen

33
Q

Risk appetite

A

Determining the acceptable level of risk for the org

34
Q

Risk tolerance

A

Line in the sand, level of risk past what can be absorbed by the org

35
Q

Business continuity

A

Plan to continue operations after an incident

36
Q

Loss control

A

Range of activities to reduce potential of risk

37
Q

Organizational resilience

A

Ability to deal with risk

38
Q

General purpose technology

A

GPT- Tech that is pervasive, improves over time, able to span new innovation
Example autonomous cars (combustion engine with digital tech)

39
Q

Recombinant innovation

A

Combine or recombine ideas to come up with a new tech

Waze

40
Q

Internet of things

A

Network of manufactured good that can send and receive data over the internet. (Appliances)

41
Q

RASP

A

Risk Architecture, risk Strategy, risk Protocols

42
Q

Risk

A

The effect of uncertainty on objectives

43
Q

Loss Prevention

A

identify treatments that help prevent hazards, reduce the likelihood.

44
Q

Digitization Risk

A

Risk of digitizing business

45
Q

Cyber Risk

A

Risk of protecting digitized data

46
Q

Red Team

A

Group of penetration testers by ethical hackers

47
Q

Hacker

A

Person who engages in unauthorized access of data

48
Q

Malware

A

Malicious software than can be inserted into digital devices

49
Q

Patch Management

A

Controlled process used to deploy critical software updates

50
Q

BYOD

A

Bring your own devices - increase risk of data

51
Q

Threat Actors

A

Hacker type - whistle blowers/anti business groups, more interested in control than money

52
Q

Zero-Day attack

A

First attack with a new malware, anti-malware are not equipped to identify this exploit

53
Q

EGGE Cyber Security Team

A

Design for a good cyber security team

1) ethically diverse
2) geographically diverse
3) gender diverse
4) educationally diverse

54
Q

Containerization

A

Isolate sections of a device

55
Q

Cyber Defense Points

A

digital locations where cyber security controls can be added

56
Q

Single point of accountability

A

All critical data processes that have a single point of accountability

57
Q

Social Engineering

A

Manipulating people through personal interaction to gain access

58
Q

Decapitation

A

Prevents device from communicating

59
Q

DLP

A

Data Loss Prevention

60
Q

IDS

A

Intrusion detection system - monitors data passing

61
Q

Defense In Depth Strategy

A

multiple layers, check and balances

62
Q

Honey pot

A

Trap (danger as the victim needs to engage with the hacker)

63
Q

Polymorphic

A

Malware that can change to avoid detection

64
Q

SSL

A

Secure Socket layers - secure encrypted protocol to prevent content from being intercepted

65
Q

Drive by download

A

unintended download of virus through the internet

66
Q

Mobile Device Management

A

MDM - Tech used to secure devices, remote wipe

67
Q

SIEM

A

Security Incident & Event Mgt (process and capabilities required to clean up security incident)

68
Q

Security Incident vs Security Event

A

Incident is major and event is a minor disruption

69
Q

Augmented Reality

A

Overlaying of a virtual digital layer onto a view of the real world.

70
Q

Corporate Governance

A

Set of relationships between an company, management, the board, shareholders, and other stakeholders