Terms Flashcards
Advanced Persistent
Threat (APT)
A nation-state actor or attacker who is supported or funded by a government to disrupt or compromise other government targets
Adware
Software that can display, or download, multiple unwanted pop-up adverts on your device. These pop-ups can come in many forms, such as banners or videos.
Antivirus
A type of software, also known as “anti-malware”, that’s used to prevent, detect, and remove malware from a system.
Attacker
A malicious actor who aims to steal, change or destroy information within a computer system, or destroy or disable the system by exploiting its weaknesses. An attacker can be a nation-state, individual, group, or organization
Blue Team
Incident Responders who work within the security unit to identify, assess and respond to the intrusion
Botnet
A type of network infected with malware that’s used to carry out cyberattacks in a remote environment
Breach
An incident, or series of incidents, in which data, computer systems, or networks are compromised (accessed or affected) in an unauthorized way
Bugs
An error or flaw is usually found within a computer, network, or hardware system. Bugs cause unexpected results and errors when using a device or system.
Cloud
Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform, or software services
Cryptocurrency
A digital currency that uses encryption techniques to secure and verify financial transactions.
Cyberattacks
Malicious attempts to damage, disrupt or gain unauthorized access to computer systems, networks, or devices, via cyber means.
Cybercrime
Criminal activities are carried out using computers or the Internet.
Red Team
Offensive security experts who try and attack an organization’s cybersecurity defenses
Penetration Testing
Also known as ethical hacking, the simulation of real-world cyber attacks to test an organization’s cybersecurity capabilities and expose vulnerabilities.
Red Teaming
The act of systematically and rigorously (and ethically) identifying an attack path that breaches the organization’s security defense through real-world attack techniques