Terms Flashcards
Advanced persistent threats
Sophisticated hacker attack that leaves behind malware. Goal is to remain in the system as long as possible before being detected
Black hat
Person who attempts to gain access to a computer system with criminal intent.
Penetration Testing
White Box - Tester has been provided range info
Black Box -No information has been given to the testers
Grey Box - Tester has been provided some limited info
Bleeding edge tech
Tech so new they are likely to cause damage and become unstable
Bot
Computer program designed for a specific task. Hacker using a bot is called a bot herder.
Dark web
Websites that hide their server location
DDos
Distributed denial of service. Cyber attacks designed to disrupt people’s use of computer systems
Ethical hacking
Use of white hats to test venerability of computer systems.
Exfiltrate
Move data with a degree of secrecy
Internet of things
Incorporation of everyday items into a network. Lights
Kill chain
Defense model that uses structure of attack to build a defense strategy
Malware
Malicious software used by hackers
Moore’s law
Over the history of computing, the processing power of computer doubles every 2 years
Polymorphic malware
Malware that can change attributes to help avoid detection.
Ransomware
Malware that holds data hostage until money is paid to hacker
Residual risk
Risk remaining after controls are put in place
Resilience
The ability to remain functional in the face of a threat
Spear phishing
Email that targets a specific person or group that pretends to come from a legit source, i.e. boss to staff
Spoofing
Concealing the true space of information by impersonation
Spyware
Malware that gathers information and transmits data to hacker
White hat
Security specialist who breaks into system by invitation
SLAM
Simultaneous localization and mapping
Kinect
Sensing device that could be used to solve the Slam issue in robots
Waze
Uses social networking to provide real time traffic information
Fin tech
Financial technology (Venmo, cash app, Apple Pay)
Reg tech
Technology that automates compliance with regulations or identifies potential violations
Block chain
Distributed open ledger
Digital risk
Digital connectedness increase risk