Cyber Security Glossary Terms Flashcards
(103 cards)
Cyber Security
The protection of digital devices and their communication channels to keep them stable, dependable, and reasonably safe from danger or threat. Usually the required protection level must be sufficient to prevent or address unauthorized access or intervention before it can lead to substantial personal, professional, organisational, financial and/or political harm.
Digital Device
Any electronic appliance that can create, modify, archive, retrieve, or transmit information in an electronic format. Desktop computers, laptops, tablets, smartphones and internet connected home devices are all examples of digital devices.
Defense in Depth
The use of multiple layers of security techniques to help reduce the chance of a successful attack. The idea is that if one security technique fails or is bypassed, there are others that should address the attack. The latest (and correct) thinking on defence in depth is that security techniques must also consider people and operations (for example processes) factors and not just technology.
Virus
A form of malicious software that spreads by infecting (attaching itself) to other files and usually seeks opportunities to continue the pattern. Viruses are now less common than other forms of malware. Viruses were the main type of malware in very early computing. For that reason, people often refer to something as a virus when it is technically another form of malware.
Crypto analysis
The art of examining ciphered information to determine how to circumvent the technique that was used to encode or hide it. Analysing ciphers.
Cloud
An umbrella term used to identify any technology service that used software and equipment not physically managed or developed by the person or org using it. This usually provides advantages of on demand scalability at low cost. Examples include applications that are hosted online, online file storage areas, even providing remote virtual computers. Using a cloud computing will mean the equipment managing the service is run by the cloud provider and not the customer. Usually a cloud service is indicated by an ‘aaS’ suffix. For example, SaaS (software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service).
Vulnerability
A weakness that could be compromised and result in damage or harm
Vector
Another word for ‘method’ - as in ‘they used multiple vectors for the attack’
Bleeding edge
Using inventions so new, they have the likelihood to cause damage to their population before they become stable and safe
Control
A method of regulating something, often a process or behaviour, to achieve a desired outcome, usually resulting in a reduction of risk. Depending on how it is designed and used, any single control may be referred to as preventative, detective or corrective.
Cyber insecurity
A suffering from concern that weaknesses in your cyber security are going to cause you personal or professional harm
Hacker
A person who engages in attempts to gain unauthorised access to one or more digital devices
Cyber attack
To take aggressive or hostile action by leveraging or targeting digital devices. The intended damage is not limited to the digital environment.
Exploit
To take advantage of a security vulnerability. Well known exploits are often given names. Falling victim to a known exploit with a name can be a sign of low security, such as poor patch management.
Threat actors
An umbrella term to describe the collection of people and orgs that work to create cyber attacks. Examples of threat actors can include cyber criminals, hacktivists and nation states.
Patch management
A controlled process used to deploy critical, interim updates to software on digital devices. The release of a software ‘patch’ is usually in response to a critical flaw or gap that has been identified. Any failure to supply new interim software updates promptly can leave open security vulnerabilities in place. As a consequence, promptly applying these updates is considered a critical component of maintaining effective cyber security.
Malware
Malicious software. A term used to describe the insertion of disruptive, subversive or hostile programs onto a digital device. These can be intentional or unintentional. Intentional versions are usually disguised or embedded in a file that looks harmless. There are many types of malware; adware, botnets, computer viruses, ransomware, scareware, spyware, trojans and worms are all examples of intentional malware. Hackers often use malware to mount cybersecurity attacks.
Botnet
Robotic network. A connected set of programs designed to operate together over a network to achieve specific purposes. The purpose can be good or bad. Some programs of this type are used to help support internet connections; malicious uses include taking over control of some or all of a computer’s functions to support large-scale service attacks. Botnets are sometimes referred to as zombie attacks.
Incident response
A prepared set of processes that should be triggered when any known or suspected event takes place that could cause material damage to an org. The typical stages are (i) verify the event is real and identify the affected areas, (ii) contain the problem (usually by isolating, disabling, or disconnecting the affected pieces), (iii) understand and eradicate the root cause, (iv) restore the affected components to their fixed state and (v) review how the process went to identify improvements that should be made. An incident response may also be required to trigger other response procedures, such as a breach notification procedure, if any information has been lost that is subject to a notification requirement.
Breach notification procedure
Some types of info, when suspected or known to be lost or stolen, must, by law, be reported to one or more authorities within a defined period. The required notification time period varies by regulator, but is often within 24 hours. In addition to reporting the known suspected loss, the lead organisation responsible for the info (data owner) is required to swiftly notify those affected, and later on, to submit a full root cause analysis and info about how they have responded and fixed the issues. To meet these legal obligations, larger companies usually have a pre-defined breach notification procedure to ensure that the timelines are met. The fines for data breaches are usually increased or decreased based on the adequacy of the org’s breach and incident response management.
Exfiltrate
To move something with a degree of secrecy sufficient not to be noticed. Used to describe moving stolen data unnoticed through detection systems.
Firewall
Hardware or software used to monitor and protect inbound and outbound data. It achieves this by applying a set of rules. These physical devices or computer programs are usually deployed, at a minimum, at the perimeter of each network access point. Software firewalls can also be deployed on devices to add further security. The rules applied within a firewall are known as the firewall policy. Advanced firewalls are often equipped with other defensive features typical of more unified threat management.
Governance
The methods used by an executive to keep his or her org on track with the management’s goals and within acceptable performance standards. This is usually achieved by establishing policies, procedures and controls that match the enterprise’s vision, strategy and risk appetite.
Chief Information Security Officer (CISO)
A single point of accountability in any org for ensuring that an appropriate framework for managing dangers and threats to electronic and physical info assets is operating and effective.