1/66
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The definition of __________ is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
Vulnerability.
A __________ is the potential for someone or something to exploit a vulnerability and breach security.
Threat.
The term __________ describes a person or entity that poses a potential security risk.
Threat actor.
The formula to assess __________ is Vulnerability + Threat = Risk (Impact * Likelihood).
Risk.
A __________ attack vector can be a direct physical or local attack where the threat actor exploits an unlocked workstation.
Direct access.
Creating an enhanced security environment involves assessing __________, threats, and the risk associated with potential attacks.
Vulnerabilities.
An example of a tool or method used by malicious threat actors is known as an __________.
Attack vector.
A malicious external threat actor must infiltrate the security system using __________ and/or social engineering.
Malware.
Insider threats often arise from employees, contractors, or business partners using their granted __________.
Permissions.
Malicious intent and motivation of a threat actor can be driven by __________, curiosity, or grievances.
Greed.
The __________ is a type of hacker with skills to gain access to systems without authorization, often for malicious purposes.
Black hat.
A __________ hacker seeks to find vulnerabilities without the owner's permission, potentially without exploitation.
Gray hat.
A team of hackers working collaboratively to develop sophisticated tools is referred to as a __________.
Hacker team.
The __________ describes the ongoing ability of an adversary to maintain access and compromise network security.
Advanced Persistent Threat (APT).
Threat research involves gathering efforts to discover the tactics, techniques, and __________ of cyber adversaries.
Procedures (TTPs).
Security teams use __________ to identify potential risks within their systems and how to mitigate them.
Security assessments.
The deep web contains pages that cannot be indexed by search engines and require __________ for access.
Registration.
Many security solution providers derive data from their customers' networks to analyze __________ and indicators.
Cybersecurity threats.
A malicious file attachment sent via email is considered an __________ attack vector.
Email.
The category of threat actors who use tools without understanding their functionality are often called __________.
Script kiddies.
The __________ actors are those who have no authorized access to the target system, often initiating attacks remotely.
External.
To assess the __________ of a vulnerability, one must consider the likelihood of exploitation and impact of a successful exploit.
Risk.
The __________ is defined as the method used by a threat actor to enter a system.
Attack vector.
The importance of __________ in network security has grown due to increasing cyber threats.
Risk assessment.
Hacktivists use cyber attacks to promote a __________ agenda.
Political.
Through a __________, security research findings can be shared and discussed among peers in the cybersecurity community.
Threat intelligence platform.
A __________ is a platform that provides threat intelligence and is often available through a subscription model.
Commercial threat intelligence platform.
Dark web sites often require __________ to access, using tools designed to anonymize users.
Specific software.
Apple offers public recognition for security researchers who submit valid reports through their __________ program.
Security bounty.
The ethical hacker category that seeks authorization to perform penetration testing is known as a __________.
White hat hacker.
Security assessments help to evaluate the __________ of a network and its defenses against attacks.
Integrity.
An external threat actor may infiltrate a system using __________ techniques to gain unauthorized access.
Social engineering.
To identify risks, one must evaluate both the __________ of an exploit and its potential impact.
Likelihood.
The presence of high-value __________ dictates prioritization in addressing cybersecurity vulnerabilities.
Assets.
A __________ relationship refers to the collaboration between security researchers and organizations to enhance security measures.
Public/private information sharing.
The use of __________ in network security refers to the various paths that malicious actors take to exploit systems.
Attack vectors.
Key __________ of threat research include understanding the motivations and capabilities of various threat actors.
Objectives.
The __________ entails malicious software concealed in attachments sent via communication channels.
Web and social media malware.
Threat actors classified based on their intentions and capabilities can be identified through multiple __________.
Categories.
Understanding __________ helps organizations implement appropriate defense strategies against potential cyber attacks.
Threat intelligence.
Organizations can gain insights into security risks by analyzing cyber threat __________ provided by various platforms.
Indicators.
The act of evaluating an organization’s infrastructure to locate vulnerabilities is called a __________ assessment.
Security.
The process of persuading users to perform actions that compromise security, such as opening malicious files, is known as __________ engineering.
Social.
A well-known example of a threat actor group that uses cyber weapons to attain political aims is __________.
Anonymous.
Risk assessment includes evaluating the ______________ and impact of vulnerabilities actively exploited by threats.
Likelihood.
Security firms leverage insights from __________ to guide their cybersecurity strategies effectively.
Incident reports.
The marketplace for illegal activities and underhanded operations on the internet is referred to as the __________.
Dark net.
To protect customers, Apple does not disclose security issues until its __________ is complete.
Investigation.
Penetration testing is typically performed by __________ hackers with prior authorization.
White hat.
Cybersecurity risk is always a function of __________ and the potential damage that could occur.
Vulnerability.
The concept of __________ encompasses the probability and implications of a security breach occurring.
Risk.
Engaging in __________ requires understanding both the technological aspects and human vulnerabilities inherent in cybersecurity.
Threat research.
Insider threats can come from employees or partners who misuse their __________ access for malicious purposes.
Granted.
Engagements in professional cybersecurity settings often rely on __________ sharing for better proactive measures against threats.
Information.
Hacking, in its origin, was perceived as a sign of technical skill and creativity, diverging into __________ and white hat distinctions.
Black hat.
Identifying __________ actors is crucial to frame the correct security strategies and allocate resources efficiently.
Threat.
An example of a __________ is exploiting an unlocked workstation or using an unsecured USB drive to compromise a system.
Direct access attack.
The likelihood of a security breach occurring involving improper __________ usage plays a key role in evaluating risks.
Configuration.
In cybersecurity, understanding the roles and behaviors of threat __________ is essential for enhancing overall security measures.
Actors.
Comprehensive investigation of cybersecurity threats often utilizes __________ practices to stay ahead of potential risks.
Proactive.
An overview of all active threats filtered by locations and types can be found in a __________ cyber threat map.
Live.
Cybersecurity experts analyze communications from the __________ to detect any potential future threats and vulnerabilities.
Dark web.
To successfully prevent attacks, organizations need an effective __________ to ensure ongoing resilience against evolving threats.
Security posture.
Employing __________ intelligence helps organizations protect against sophisticated attack tactics employed by adversaries.
Threat.
The __________ pays attention to potential vulnerabilities resulting from improperly configured hardware, software, or networks.
Vulnerability assessment.
A company providing cloud services needs to specifically assess the security of its __________ to safeguard critical systems.
Infrastructure.
Conducting continuous __________ assessments helps in identifying and mitigating threats before exploitation occurs.
Vulnerability.