Cybersecurity - is a practice of protecting systems, networks, and programs from digital attacks.
Security Architect – This individual is responsible for maintaining the security of a company’s computer system.
Security Consultant – S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.
Ethical Hacker – Also referred to as a white hat hacker.
Chief Information Security Officer (CISO) – This person is responsible for an organization’s information and data security.
THE ANATOMY OF CYBERATTACK
Step 1: Reconnaissance Hackers - usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.
Step 2: Attack - After getting access to the network, hackers proceed with infiltrating the organization’s network.
Step 3: Expansion - Hackers intrude all systems on the network using malicious programs.
Step 4: Obfuscation - Hackers proceed to hiding their tracks to mask the origins of the attack
Ransomware - is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid
Malware - is a type of software designed to gain unauthorized access or cause damage to a computer.
Social engineering - is a tactic that adversaries use to trick a user into revealing sensitive information.
Phishing - is the practice of sending fraudulent e-mails that resemble e-mails from reputable sources.
Crypting services - are used for encrypting malware to obscure and make the data difficult to detect.
Crimeware - is the buying and selling of malware on the “Dark Web,” a black market for cyber criminals
Remote administration tools - are a type of malware that, once activated, grants hackers control over the infected computer.
Keyloggers - are malware that tracks keystrokes, enabling the attacker to eavesdrop on confidential conversations and steal login credentials.
Exploit kits - work by targeting users who think they are visiting a trusted site but then get redirected to a malicious site.
Leaked data - are data stolen from a user’s machine that can easily be sold on the Dark Web
Card skimmers - are implanted in places like Point-of-Sale (POS) machines, bank teller machines, and gas pumps to steal identity and credit card account data.
Unpatched systems – A great proportion of cybersecurity vulnerabilities can be resolved through the application of software patches.
Hardware authentication - is a well-known fact that a majority of data users’ passwords and usernames are weak.
Cloud technology - is set to have a significant impact on the transformation of systems security technology.
Deep learning - encompasses some technologies like machine learning and artificial intelligence
INFO ASSURANCE PRELIMS
Cybersecurity - is a practice of protecting systems, networks, and programs from digital attacks.
Security Architect – This individual is responsible for maintaining the security of a company’s computer system.
Security Consultant – S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.
Ethical Hacker – Also referred to as a white hat hacker.
Chief Information Security Officer (CISO) – This person is responsible for an organization’s information and data security.
THE ANATOMY OF CYBERATTACK
Step 1: Reconnaissance Hackers - usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.
Step 2: Attack - After getting access to the network, hackers proceed with infiltrating the organization’s network.
Step 3: Expansion - Hackers intrude all systems on the network using malicious programs.
Step 4: Obfuscation - Hackers proceed to hiding their tracks to mask the origins of the attack
Ransomware - is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid
Malware - is a type of software designed to gain unauthorized access or cause damage to a computer.
Social engineering - is a tactic that adversaries use to trick a user into revealing sensitive information.
Phishing - is the practice of sending fraudulent e-mails that resemble e-mails from reputable sources.
Crypting services - are used for encrypting malware to obscure and make the data difficult to detect.
Crimeware - is the buying and selling of malware on the “Dark Web,” a black market for cyber criminals
Remote administration tools - are a type of malware that, once activated, grants hackers control over the infected computer.
Keyloggers - are malware that tracks keystrokes, enabling the attacker to eavesdrop on confidential conversations and steal login credentials.
Exploit kits - work by targeting users who think they are visiting a trusted site but then get redirected to a malicious site.
Leaked data - are data stolen from a user’s machine that can easily be sold on the Dark Web
Card skimmers - are implanted in places like Point-of-Sale (POS) machines, bank teller machines, and gas pumps to steal identity and credit card account data.
Unpatched systems – A great proportion of cybersecurity vulnerabilities can be resolved through the application of software patches.
Hardware authentication - is a well-known fact that a majority of data users’ passwords and usernames are weak.
Cloud technology - is set to have a significant impact on the transformation of systems security technology.
Deep learning - encompasses some technologies like machine learning and artificial intelligence