C5 M3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Advanced persistent threat (APT):

An instance when a threat actor maintains unauthorized access to a system for an extended period of time 

2
New cards

Attack surface:

All the potential vulnerabilities that a threat actor could exploit

3
New cards

Attack tree:

A diagram that maps threats to assets

4
New cards

Attack vector:

The pathways attackers use to penetrate security defenses 

5
New cards

Bug bounty:

Programs that encourage freelance hackers to find and report vulnerabilities

6
New cards

Common Vulnerabilities and Exposures (CVE®) list:

An openly accessible dictionary of known vulnerabilities and exposures

7
New cards

Common Vulnerability Scoring System (CVSS):

A measurement system that scores the severity of a vulnerability

8
New cards

CVE Numbering Authority (CNA)

An organization that volunteers to analyze and distribute information on eligible CVEs

9
New cards

Defense in depth

A layered approach to vulnerability management that reduces risk

10
New cards

Exploit:

A way of taking advantage of a vulnerability

11
New cards

Exposure

A mistake that can be exploited by a threat

12
New cards

Hacker:

Any person who uses computers to gain access to computer systems, networks, or data

13
New cards

MITRE

A collection of non-profit research and development centers

14
New cards

Security hardening

The process of strengthening a system to reduce its vulnerability and attack surface

15
New cards

Threat actor

Any person or group who presents a security risk

16
New cards

Vulnerability

A weakness that can be exploited by a threat

17
New cards

Vulnerability assessment

The internal review process of a company’s security systems

18
New cards

Vulnerability management

The process of finding and patching vulnerabilities

19
New cards

Vulnerability scanner

Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network

20
New cards

Zero-day

An exploit that was previously unknown