Vocab Words Flashcards
a senior position within an orgs security team with direct responsibility for protecting sensitive information and preventing unauthorized access to electronic data and the systems that protect it
Cybersecurity Analyst
a location where security professionals monitor and protect critical information assets in an organization.
Security Operations Center (SOC)
mitigates vulnerabilities and risk to ensure the confidentiality, integrity, availability, nonrepudiation, and authentication of data
Security Control
category of security controls that is implemented as a system
Technical Controls
category of security controls that are implemented primarily by people
Operational Controls
category of security controls that provide oversight of the system
Managerial Controls
control that eliminates or reduces likelihood that an attack succeeds
Preventative Controls
a control that may not prevent or deter access, but will identify and record any attempted or successful intrusion
Detective Control
control that eliminates or reduces the impact of an intrusion event
Corrective Control
process where data is generated and is collected, processed, analyzed, and disseminated to provide insights of the security status of the system
Security Intelligence
investigation, collection, analysis, and dissemination of information about emerging threats and threat sources to provide data about the threat landscape
Cyber Threat Intelligence
method of obtaining information about a person or organization through public records, websites, and social media
Open-Source Intelligence (OSINT)
not for profit group set up to share sector-specific threat intelligence and security best practices amongst its members
Information Sharing and Analysis Centers (ISACS)
threat that can be identified using basic signature or pattern matching
*malware or documented exploits
Known Threat
threats that cannot be identified using basic signature or pattern matching
Unknown Threat
any unknown exploit in the wild that exposes a vulnerability and can create problems before anyone realizes something is wrong
Zero-Day Exploit
malicious code that the malware author has attempted to hid through various techniques
Obfuscated Malware Code
malware detection method that evaluates an object based on its intended actions before it can actually execute that behavior
Behavior Based Detection
process of combining and modifying parts of an existing exploit code to create new threats that are not as easily identified by automated scanning
Recycled Threats
malware that contains obfuscation techniques to circumvent signature matching and detection
Known Unknowns
a classification of malware that contains completely new attack vectors and exploits
Unknown Unknowns
those who wish to harm networks or steal secure data
Threat Actor
uses other people’s tools to conduct their attacks as they don’t have the skills to make their own tools
Script Kiddie
those who have authorized access to an orgs network, policies, and procedures and business practices
*can be intentional or unintentional
Threat Actor