Assets, Threats, and Vulnerabilities: Module 3 Flashcards
(20 cards)
Advanced Persistent Threat (APT)
When a hacker stays inside a system for a long time without permission
Attack Surface
All the places a hacker could break into
Attack Tree
A diagram showing how a hacker might attack
Attack Vector
The path a hacker uses to break in
Bug Bounty
A reward program for finding security problems
Common Vulnerabilities and Exposures (CVE®) List
A public list of known security problems
Common Vulnerability Scoring System (CVSS)
A system that scores how bad a vulnerability is
CVE Numbering Authority (CNA)
Groups that help add new security problems to the CVE list
Defense in Depth
Using many layers of security to stay safe
Exploit
A trick that uses a security problem to cause harm
Exposure
A mistake that makes a system easier to attack
Hacker
Someone who tries to access systems or data
MITRE
A group that helps with research on public safety and cybersecurity
Security Hardening
Making a system stronger and harder to hack
Threat Actor
Anyone who might cause harm to systems or data
Vulnerability
A weakness that hackers can use to break in
Vulnerability Assessment
A checkup to find weaknesses in security
Vulnerability Management
The process of finding and fixing security problems
Vulnerability Scanner
A tool that checks for known weaknesses
Zero-Day
A brand-new security problem that no one knew about before