Assets, Threats, and Vulnerabilities Flashcards
(98 cards)
What are Access Controls?
Security controls that manage access, authorization, and accountability of information
What is Adware?
A type of legitimate software that is sometimes used to display digital advertisements in applications
What is APT?
Advanced Persistent Threat - An instance when a threat actor maintains unauthorized access to a system for an extended period of time
What is Algorithm?
A set of rules used to solve a problem
What is Angler Phising?
A technique where attackers impersonate customer service representatives on social media
What is a API token?
Application Programming Interface -A small block of encrypted code that contains information about a user
What is an Asset?
An item perceived as having value to an organization
What is Asset Classification?
The practice of labeling assets based on sensitivity and importance to an organization
What is Asset Inventory?
A catalog of assets that need to be protected
What is Asset Management?
The process of tracking assets and the risks that affect them
What is Asymmetric Encryption?
The use of a public and private key pair for encryption and decryption of data
What is a Attack Surface?
The characteristics and features of the areas where an attack can come from
What is a Attack Tree?
A diagram that maps threats to assets
What is a Attack Vector?
The pathways attackers use to penetrate security defenses
What is Baiting?
A social engineering tactic that tempts people into compromising their security
What is Basic Auth?
The technology used to establish a user’s request to access a server
What is a Bit?
The smallest unit of data measurement on a computer
What is Botnet
A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”
What is a Brute Force Attack?
The trial and error process of discovering private information
What is a Bug Bounty?
Programs that encourage freelance hackers to find and report vulnerabilities
What is a Cypher?
An algorithm that encrypts information
What is a CVE list?
An openly accessible dictionary of known vulnerabilities and exposures
What is CVSS?
A measurement system that scores the severity of a vulnerability
What is Compliance?
The process of adhering to internal standards and external regulations