Chapter 2: Cybersecurity Threat Landscape

studied byStudied by 5 people
0.0(0)
Get a hint
Hint

Shadow IT

1 / 31

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

32 Terms

1

Shadow IT

Computer hardware, software, or services used on a private network without authorization from the system owner.

New cards
2

Ransomware attack

a kind of cyberattack in which malware locks the data on a victim's computer and demands payment to decrypt the data.

New cards
3

Three types of hackers

White Hat Hackers

Black Hat Hackers

Gray Hat Hackers

New cards
4

white hat hackers

ethical hackers that break into the systems for non malicious reasons such as to test the system security vulnerabilities or to expose undisclosed weaknesses

New cards
5

black hat hackers

break into systems to destroy information or for illegal gain

New cards
6

gray hat hackers

Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling.

New cards
7

Script kiddies or script bunnies

Hackers that find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses but have limited skills.

New cards
8

Hacktivists/Hactivism

a person who gains unauthorized access to computer files or networks in order to further social or political ends.

New cards
9

Criminal syndicates

A type of threat actor that uses hacking and computer fraud for commercial gain. Also referred to as organized crime.

New cards
10

Advanced Persistent Threat (APT)

A network attack in which an intruder gains access to a network and stays there undetected with the intention of stealing data over a long period of time.

New cards
11

Nation-state attacks

a serious and growing threat that organizations of all sizes face. Their primary objective is to gain strategic advantage for their country, such as by stealing secrets, gathering cyber intelligence, conducting reconnaissance, or disrupting operations.

New cards
12

zero-day attack

Attack that exploits previously unknown vulnerabilities, so victims have no time (zero days) to prepare for or defend against the attack.

New cards
13

Insider Threat

A threat to an organization that comes from employees, contractors, and anyone else that may have willingly been given insider knowledge.

New cards
14

Dark Web

The portion of the internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser.

New cards
15

Threat Assessment

a process that involves carefully considering the nature of the threat, the risk posed by the individual making it, and the indicated response to reduce the risk of harmful action

New cards
16

Threat Vector

The means by which a threat actor carries out their objectives.

New cards
17

Email and Social Media

most commonly exploited threat vectorfs

New cards
18

direct access

gain direct access to an organization's network by physically entering the organization's facilities.

New cards
19

Wireless Network

a network where users can access the Internet without the use of fixed cables

New cards
20

Removable Media

A portable device allowing for the storage of computer data.

New cards
21

cloud services

A collection of data centers or connected servers that provide anywhere anytime access to data and applications

New cards
22

Third-party risks

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.

New cards
23

Threat Intelligence

Set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment

New cards
24

Predictive Analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

New cards
25

Open Source Threat Intelligence

Threat intelligence that is acquired from publicly available sources.

New cards
26

Closed-Source Intelligence

Data that is derived from the provider's own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers' systems, suitably anonymized

New cards
27

Threat maps

A real-time map of the computer security attacks that are going on at any given time.

New cards
28

Confidence Scores

Allow organizations to filter and use threat intelligence based on how much trust they can give it.

New cards
29

Structured Threat Information eXpression (STIX)

A standardized and structured language that represents threat information in a flexible, automatable, and easy-to-use manner.

New cards
30

Organization for the Advancement of Structured Information Standards (OASIS)

an international nonprofit consortium that maintains many other projects related to information formatting, including XML and HTML

New cards
31

Consortium

a group of companies or institutions

New cards
32

Information Sharing and Analysis Centers (ISACs)

Not-for-profit group set up to share sector-specific threat intelligence and security best practices amongst its members.

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 32 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 67 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 115 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 514 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 31 people
Updated ... ago
4.0 Stars(1)

Explore top flashcards

flashcards Flashcard66 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard115 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard65 terms
studied byStudied by 53 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 44 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard75 terms
studied byStudied by 219 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard21 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(2)