Chapter 2: Cybersecurity Threat Landscape

studied byStudied by 5 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 31

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

32 Terms

1

Shadow IT

Computer hardware, software, or services used on a private network without authorization from the system owner.

New cards
2

Ransomware attack

a kind of cyberattack in which malware locks the data on a victim's computer and demands payment to decrypt the data.

New cards
3

Three types of hackers

White Hat Hackers

Black Hat Hackers

Gray Hat Hackers

New cards
4

white hat hackers

ethical hackers that break into the systems for non malicious reasons such as to test the system security vulnerabilities or to expose undisclosed weaknesses

New cards
5

black hat hackers

break into systems to destroy information or for illegal gain

New cards
6

gray hat hackers

Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling.

New cards
7

Script kiddies or script bunnies

Hackers that find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses but have limited skills.

New cards
8

Hacktivists/Hactivism

a person who gains unauthorized access to computer files or networks in order to further social or political ends.

New cards
9

Criminal syndicates

A type of threat actor that uses hacking and computer fraud for commercial gain. Also referred to as organized crime.

New cards
10

Advanced Persistent Threat (APT)

A network attack in which an intruder gains access to a network and stays there undetected with the intention of stealing data over a long period of time.

New cards
11

Nation-state attacks

a serious and growing threat that organizations of all sizes face. Their primary objective is to gain strategic advantage for their country, such as by stealing secrets, gathering cyber intelligence, conducting reconnaissance, or disrupting operations.

New cards
12

zero-day attack

Attack that exploits previously unknown vulnerabilities, so victims have no time (zero days) to prepare for or defend against the attack.

New cards
13

Insider Threat

A threat to an organization that comes from employees, contractors, and anyone else that may have willingly been given insider knowledge.

New cards
14

Dark Web

The portion of the internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser.

New cards
15

Threat Assessment

a process that involves carefully considering the nature of the threat, the risk posed by the individual making it, and the indicated response to reduce the risk of harmful action

New cards
16

Threat Vector

The means by which a threat actor carries out their objectives.

New cards
17

Email and Social Media

most commonly exploited threat vectorfs

New cards
18

direct access

gain direct access to an organization's network by physically entering the organization's facilities.

New cards
19

Wireless Network

a network where users can access the Internet without the use of fixed cables

New cards
20

Removable Media

A portable device allowing for the storage of computer data.

New cards
21

cloud services

A collection of data centers or connected servers that provide anywhere anytime access to data and applications

New cards
22

Third-party risks

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.

New cards
23

Threat Intelligence

Set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment

New cards
24

Predictive Analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

New cards
25

Open Source Threat Intelligence

Threat intelligence that is acquired from publicly available sources.

New cards
26

Closed-Source Intelligence

Data that is derived from the provider's own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers' systems, suitably anonymized

New cards
27

Threat maps

A real-time map of the computer security attacks that are going on at any given time.

New cards
28

Confidence Scores

Allow organizations to filter and use threat intelligence based on how much trust they can give it.

New cards
29

Structured Threat Information eXpression (STIX)

A standardized and structured language that represents threat information in a flexible, automatable, and easy-to-use manner.

New cards
30

Organization for the Advancement of Structured Information Standards (OASIS)

an international nonprofit consortium that maintains many other projects related to information formatting, including XML and HTML

New cards
31

Consortium

a group of companies or institutions

New cards
32

Information Sharing and Analysis Centers (ISACs)

Not-for-profit group set up to share sector-specific threat intelligence and security best practices amongst its members.

New cards

Explore top notes

note Note
studied byStudied by 10 people
807 days ago
5.0(1)
note Note
studied byStudied by 35 people
275 days ago
5.0(1)
note Note
studied byStudied by 15 people
916 days ago
5.0(1)
note Note
studied byStudied by 30 people
965 days ago
5.0(1)
note Note
studied byStudied by 48 people
859 days ago
5.0(2)
note Note
studied byStudied by 8 people
720 days ago
5.0(2)
note Note
studied byStudied by 49 people
1000 days ago
5.0(2)
note Note
studied byStudied by 11837 people
502 days ago
4.8(83)

Explore top flashcards

flashcards Flashcard (46)
studied byStudied by 3 people
90 days ago
5.0(1)
flashcards Flashcard (204)
studied byStudied by 2 people
696 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 7 people
538 days ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 42 people
807 days ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 1369 people
482 days ago
3.8(21)
flashcards Flashcard (163)
studied byStudied by 24 people
277 days ago
5.0(1)
flashcards Flashcard (157)
studied byStudied by 92 people
133 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 2 people
1 minute ago
5.0(1)
robot