Vocabulary Flashcards

1
Q

Threat

A

A potential danger to an asset
A threat can be latent or realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

A weakness in the system design, implementation, software, code, or the lack of a mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

A process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or FoS on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat intelligence

A

The knowledge about an existing or emerging threat to assets that can be exchanged between different parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wrapper

A

A program used to combine two or more executable into a single packaged program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packers

A

A program that compresses files to obfuscate the activity of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Droppers

A

A software designed to install a malware payload on the victim’s system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Crypters

A

Functions to encrypt or obscure the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

A piece of malware designed to encrypt personal files on the victim’s system until a ransom is paid to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IaaS

A

Describes a cloud solution in which you rent infrastructure, pay for what you use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PaaS

A

Provides everything except applications
Tend to be proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Saas

A

Designed to provide a complete packaged solution and rented out to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST Cybersecurity Framework

A

A blueprint to address and manage cybersecurity risk in a cost-effective way to protect critical infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

STIX

A

Structured Threat Information eXpression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TAXII

A

Trusted Automated eXchange of Indicator Information
Transport mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly