Exam 1 Flashcards

1
Q

Asset

A

Organizational resource that is being protected. Can be logical, such as a web site, software information, or data; can be physical, such as a person, computer system, hardware, or other tangible object. Assets, particularly information assets, are the focus of what security efforts are attempting to protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Asset

A

Focus of information security; information that has value to the organization, and the systems that store, process, and transmit the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security (InfoSec)

A

Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security

A

State of being secure and free from danger or harm. In addition, the actions taken to make someone or something secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

Access control mechanism that ensures all actions on a system - authorized or unauthorized - can be attributed to an authenticated identity. Also known as audibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Access control mechanism that requires the validation and verification of an unauthenticated entity’s purported identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

C.I.A. Triad

A

Industry standard for computer security since the development of the mainframe. The standard is based on three characteristics that describe the utility of information: confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disclosure

A

In information security, the intentional or unintentional exposure of an information asset to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identification

A

Access control mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information Aggregation

A

Collection and combination of pieces of non private data, which could result in information that violates privacy. Not to be confused with aggregate information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrity

A

Attribute of information that describes how data is whole, complete, and uncorrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy

A

In the context of information security, the right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack

A

Intentional or unintentional act that can damage or otherwise compromise information and the systems that support it. Threat Event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Exploit

A

Technique used to compromise a system. This term can be a verb or noun. Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Loss

A

Single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threat

A

Any event or circumstance that has the potential to adversely affect operations and assets. The term threat source is commonly used interchangeably with the more generic term threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Threat Agent

A

Specific instance or a component of a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability

A

Potential weakness in an asset or its defensive control system(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Intellectual Property (IP)

A

Creation, ownership, and control of original ideas as well as the representation of those ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software Piracy

A

Unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability Disruption

A

Interruption in service, usually from a service provider, which causes an adverse event within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Blackout
Long-term interruption in electrical power availability.
26
Brownout
Long-term decrease in the quality of electrical power availability.
27
Fault
Short-term interruption in electrical power availability.
28
Noise
Presence of additional and disruptive signals in network communications or electrical power delivery.
29
Sag
Short-term decrease in electrical power availability.
30
Service Level Agreement (SLA)
Document or part of a document that specifies the expected level of service from a service provider. Usually contains provisions for minimum acceptable availability and penalties or remediation procedures for downtime.
31
Spike
Short-term increase in electrical power availability, also known as swell.
32
Surge
Long-term increase in electrical power availability.
33
Advanced Persistent Threat (APT)
Collection of processes, usually directed by a human agent, that targets a specific organization or individual.
34
Brute Force Password Attack
Attempt to guess a password by attempting every possible combination of characters and numbers in it.
35
Competitive Intelligence
Collection and analysis of information about an organization's business competitors through legal and ethical means to gain business intelligence and competitive advantage.
36
Cracker
Hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use.
37
Cracking
Attempting to reverse-engineer, remove, or bypass a password or other access control protection, such as the copyright protection on software.
38
Dictionary Password Attack
Variation of the brute force password attack that attempts to narrow the range of possible passwords guessed by using a list of common passwords and possibly including attempts based on the target's personal information.
39
Expert Hacker
Hacker who uses extensive knowledge of the inner workings of computer hardware and software to gain unauthorized access to systems and information. Also known as elite hackers. Often create automated exploits,scripts, and tools used by other hackers.
40
Industrial Espionage
Collection and analysis of information about an organization's business competitors, often through illegal or unethical means, to gain an unfair competitive advantage. Also known as corporate spying, which is distinguished from espionage for national security reasons.
41
Jailbreaking
Escalating privileges to gain administrator-level control over a smartphone operating system (usually i phones)
42
Novice Hacker
Relatively unskilled hacker who uses the work of expert hackers to perform attacks. aka neophyte, n00b, or newbie. Includes script kiddies and packet monkeys.
43
Packet Monkey
Script kiddie who uses automated exploits to engage in denial-of-service attacks.
44
Penetration Tester
Information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems.
45
Phreaker
Hacker who manipulates the public telephone system to make free calls or disrupt services.
46
Pretexting
Form of social engineering in which the attacker pretends to be an authority figure who needs information to confirm the target's identity, but the real object is to trick the target into revealing confidential information. Commonly performed by telephone.
47
Privilege Escalation
Unauthorized modification of an authorized or unauthorized system user account to gain advanced access and control over system resources.
48
Professional Hacker
Hacker who conducts attacks for personal financial benefit or for a crime organization or foreign government. Not to be confused with a penetration tester.
49
Rainbow Table
Table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file.
50
Rooting
Escalating privileges to gain administrator-level control over a computer system (including smart phones). Typically associated with Linux and Android operating systems. See also jailbreaking.
51
Script Kiddie
Hacker of limited skill who uses expertly written software to attack a system. aka skids, kiddies, or script bunnies.
52
Shoulder Surfing
Direct, covert observation of individual information or system use.
53
Trespass
Unauthorized entry into the real or virtual property of another party.
54
Advance-Fee Fraud (AFF)
Form of social engineering, typically conducted via email, in which an organization or some third party indicates that the recipient is due an exorbitant amount of money and needs only a small advance fee or personal banking information to facilitate the transfer. This may also involve prepayment for services with a payment larger than required; the overpayment is returned and then the initial payment is repudiated.
55
Phishing
Form of social engineering in which the attacker provides what appears to be a legitimate communication, but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information.
56
Social Engineering
Process of using social skills to convince people to reveal access credentials or other valuable information to an attacker.
57
Spear Phishing
Any highly targeted phishing attack.
58
Information Extortion
Act of an attacker or trusted insider who steals information from a computer system and demands compensation for its return or for an agreement not to disclose the information. aka cyberextortion
59
Ransomware
Computer software specifically designed to identify and encrypt valuable information in a victim's system in order to extort payment for the key needed to unlock the encryption.
60
Cyberterrorism
Conduct of terrorist activities by online attackers.
61
Cyberwarfare
Formally sanctioned offensive operations conducted by a government or state against information or systems of another government or state aka information warefare
62
Hacktivist
Hacker who seeks to interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. aka cyberactivist.
63
Back Door
Malware payload that provides access to a system by bypassing normal access controls. Also an intentional access control bypass left by a system designer to facilitate development.
64
Boot Virus
Type of virus that targets the boot sector or Master Boot Record of a computer system's hard drive or removable storage media.
65
Clickbait
Content such as email attachments or embedded links crafted to convince unsuspecting users into clicking them which results in more web traffic for the content provider or the installation of unwanted software or malware.
66
Denial-of-Service (DoS) Attack
Attempts to overwhelm a computer target's ability to handle incoming communications, prohibiting legitimate users from accessing those systems.
67
Distributed Denial-of-Service (DDoS) Attack
DoS attack in which a coordinated stream of requests is launched against a target from many locations at the same time using bots or zombies.
68
Domain Name System (DNS) Cache Poisoning
Intentional hacking and modification of a DNS database to redirect legitimate traffic to illegitimate internet locations. aka DNS spoofing
69
Macro Virus
Type of virus w written in a specific macro language to target applications that use the language. Virus is activated when the application's product is opened. Typically affects documents, slideshows, emails, or spreadsheets created by office suite applications.
70
Malware
Computer software specifically designed to perform malicious or unwanted actions.
71
Polymorphic Threat
Malware that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
72
Virus
Type of malware that is attached to other executable programs. When activated, it replicates and propagates itself to multiple systems, spreading by multiple communications vectors. For example, a virus might send copies of itself to all users in the infected system's email program.
73
Mean Time Between Failures (MTBF)
Average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures.
74
Mean Time to Diagnose (MTTD)
Average amount of time a computer repair technician needs to determine the cause of a failure.
75
Mean Time to Failure (MTTF)
Average amount of time until the next hardware failure.
76
Mean Time to Repair (MTTR)
Average amount of time a computer repair technician needs to resolve the cause of a failure through replacement or repair of a faulty unit.
77
Leadership
Process of influencing others and gaining their willing cooperation to achieve an objective by providing purpose, direction, and motivation.
78
Management
Process of achieving objectives by appropriately applying a given set of resources.
79
Controlling
Process of monitoring progress and making necessary adjustments to achieve desired goals or objectives.
80
Organizing
Structuring of resources to maximize their efficiency and ease of use.
81
Planning
Process of creating designs or schemes for future efforts or performance.
82
Governance
Set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise's resources are used responsibly.
83
Policy
Guidelines that dictate certain behavior within the organization.
84
Ethics
Branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgment.
85
Deterrence
Act of attempting to prevent an unwanted action by threatening punishment or retaliation on the instigator if the act takes place.
86
Computer Fraud and Abuse (CFA) Act
Cornerstone of many computer-related federal laws and enforcement efforts, the CFA formally criminalizes "accessing a computer without authorization or exceeding authorized access" for systems containing information of national interest as determined by the U.S. government.
87
Computer Security Act (CSA)
US law designed to improve security of federal information systems. It charged the National Bureau of Standards, now NIST, with the development of standards, guidelines, and associated methods and techniques for computer systems, among other responsibilities.
88
Electronic Communications Privacy Act (ECPA) of 1986
Collection of statutes that regulate the interception of wire, electronic, and oral communications. These statutes are frequently referred to as the "federal wiretapping acts."
89
Health Insurance Portability and Accountability Act (HIPAA) of 1996
Attempts to protect the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
90
Privacy Act of 1974
Federal law that regulates the government's collection, storage, use, and dissemination of individual personal information contained in records maintained by the federal government.
91
Due Care
Measures that an organization takes to ensure every employee knows what is acceptable and what is not.
92
Due Diligence
Reasonable steps taken by people or organizations to meet the obligations imposed by laws or regulations.
93
Jurisdiction
Power to make legal decisions and judgments, typically an area within which an entity such as a court or law enforcement agency is empowered to make legal decisions.
94
Liability
Entity's legal obligation or responsibility.
95
Long-Arm Jurisdiction
Ability of a legal entity to exercise its influence beyond its normal boundaries by asserting a connection between an out-of-jurisdiction entity and a local legal case.
96
Restitution
Legal requirement to make compensation or payment resulting from a loss or injury.
97
Digital Forensics
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis. Like traditional forensics, digital forensics follows clear, well defined methodologies but still tends to be as much art as science.
98
Digital Malfeasance
Crime against or using digital media, computer technology, or related components; in other words, a computer is the source of a crime or the object of a crime.
99
e-discovery
Identification and preservation of evidentiary material related to a specific legal action.
100
Evidentiary Material
Also known as "items of potential evidentiary value," any information that could potentially support the organization's legal or policy-based case against a suspect.
101
Evidentiary Material Policy (EM Policy)
Policy document that guides the development and implementation of EM procedures regarding the collection, handling, and storage of items of potential evidentiary value, as well as the organization and conduct of EM collection teams.
102
Forensics
Coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court-like setting. Forensics allows investigators to determine what happened by examining the results of an event - criminal, natural, intentional, or accidental.
103
Search Warrant
Permission to search for evidentiary material at a specified location and/or to seize items to return to the investigator's lab for examination. An affidavit becomes a search warrant when signed by an approving authority.
104
Stakeholder
A person or organization that has a stake or vested interest in a particular aspect of the planning or operation of the organization in this case, the information assets used in a particular organization.
105
Strategic Planning
Process of defining and specifying the long-term direction (strategy) to be taken by an organization, and the allocation and acquisition of resources needed to pursue this effort.
106
Governance, Risk Management, and Compliance (GRC)
An approach to information security strategic guidance from a board of directors or senior management perspective that seeks to integrate the three components of information security governance, risk managements, and regulatory compliance.
107
Champion
High-level executive, such as a CIO or VP-IT, who will provide political support and influence for a specific project.
108
Controls and Safeguards
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.
109
Methodology
Formal approach to solving a problem based on a structured sequence of procedures, the use of which ensures a rigorous process and increases the likelihood of achieving the desired final objective.
110
Security Systems Development Life Cycle (SecSDLC)
Formal approach to designing information security programs that follows the methodology of a traditional information systems development life cycle (SDLC), including a recursive set of phases such as investigation, analysis, logical design, physical design, implementation, and maintenance and change.
111
Systems Development Life Cycle (SDLC)
Methodology for the design and implementation of an information system. The SDLC contains different phases depending on the methodology deployed, but generally the phases address the investigation, analysis, design, implementation, and maintenance of an information system.
112
Information Security Policies
Written instructions provided by management that inform employees and others in the workplace about proper behavior regarding the use of information and information assets.
113
Policy
In business, a statement of managerial intent designed to guide and regulate employee behavior in the organization; in IT, a computer configuration specification used to standardize system and user behavior.
114
Guidelines
Nonmandatory recommendations the employee may use as a reference in complying with a policy. If the policy states to "use strong passwords, frequently Changed," the guidelines might advise that "we recommend you don't use family or pet names, or parts of your Social Security number, employee number, or phone number in your password."
115
Practices
Examples of actions that illustrate compliance with policies. If the policy states to "use strong passwords, frequently changed," the practices might advise that "according to X, most organizations require employees to change passwords at least semiannually."
116
Procedures
Step-by-step instructions designed to assist employees in following policies standards and guidelines. If the policy states to "use strong passwords, frequently changed," the procedure might advise that "in order to change your password, first click on the Windows Start button, then . . ."
117
Standard
A detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance. If the policy states that employees must "use strong passwords, frequently changed," the standard might specify that the password "must be at least 8 characters, with at least one number, one letter, and one special character."
118
Enterprise Information Security Policy (EISP)
The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts. An EISP is also known as a security program policy, general security policy, IT security policy, high-level InfoSec policy, or simply an InfoSec policy.
119
Issue-Specific Security Policy (ISSP)
Organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies.
120
Access Control Lists (ACLs)
Specifications of authorization that govern the rights and privileges of users to a particular information asset. ACLs include user access lists, matrices, and capability tables.
121
System-Specific Security Policies (SysSPs)
Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems. SysSPs can be separated into two general groups, managerial guidance and technical specifications, but may be written as a single unified SysSP document.
122
Information Security Program
Entire set of activities, resources, personnel, and technologies used by an organization to manage the risks to its information assets.
123
Chief Information Officer (CIO)
Typically considered the top information technology officer in an organization. The CIO is usually an executive-level position, and frequently the person in this role reports to the CEO.
124
Chief Information Security Officer (CISO)
Typically considered the top information security officer in an organization. The CISO is usually not an executive-level position, and frequently the person in this role reports to the CIO.
125
Chief Security Officer (CSO)
In some organizations, an alternate title for the CISO; in other organizations, the title most commonly assigned to the most senior manager or executive responsible for both information and physical security.
126
Security Administrator
Hybrid position comprising the responsibilities of both a security technician and a security manager.
127
Security Analyst
Specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system.
128
Security manager
In larger organizations, a manager responsible for some aspect of information security who reports to the CISO; in smaller organizations, this title may be assigned to the only or senior security administrator.
129
Security Technician
Technical specialist responsible for the implementation and administration of some security-related technology.
130
Security Watchstander
Entry-level InfoSec professional responsible for the routine monitoring and operation of a particular InfoSec technology. Also known as a security staffer.
131
Security Awareness
Portion of the SETA program dedicated to keeping conscious of key InfoSec issues through the use of newsletters, posters, trinkets, and other methods.
132
Security Education
Portion of the SETA program based on formal delivery of knowledge of InfoSec issues and operations, usually through institutions of higher learning.
133
Security Education, Training, and Awareness (SETA)
Managerial program designed to improve the security of information assets by providing targeted knowledge, skills, and guidance for organizational employees.
134
Security Training
Portion of the SETA program focused on providing users with the knowledge, skill, and/or ability to use their assigned resources wisely to avoid creating additional risk to organizational information assets.
135
Project Management
Process of identifying and controlling the resources applied to a project as well as measuring progress and adjusting the process as progress is made toward the goal.
136
Scope Creep
Expansion of the quantity or quality of project deliverables from the original project plan.
137
Critical Path Method (CPM)
Diagramming technique, similar to PERT, designed to identify the sequence of tasks that make up the shortest elapsed time needed to complete a project.
138
Gantt Chart
Diagramming technique named for its developer, Henry Gantt, which lists activities on the vertical axis of a bar chart and provides a simple timeline on the horizontal axis.
139
Program Evaluation and Review Technique (PERT)
Diagramming technique developed in the late 1950s that involves specifying activities and their sequence and duration.
140
Projectitis
Situation in project planning in which the project manager spends more time documenting project tasks, collecting performance measurements, recording prject task information, and updating project completion forecasts in the project management software than accomplishing meaningful project work.
141
Work Breakdown Structure (WBS)
List of the tasks to be accomplished in the project; the WBS provides details for the work to be accomplished, the skill sets or even specific individuals to perform the tasks, the start and end dates for the task, the estimated resources required, and the dependencies between and among tasks.
142
Enterprise Risk Management (ERM)
Evaluation and reaction to risk to the entire organization; ERM is not restricted to the risk facing information assets.
143
Risk Assessment
An approach to combining risk identification, risk analysis, and risk evaluation into a single strategy.
144
Risk Management (RM)
Entire program of planning for and managing risk to information assets in the organization. Also InfoSec risk management.
145
RM Framework
The overall structure of the strategic planning and design for the entirety of the organizations RM (risk management).
146
RM Process
Identification, analysis, evaluation, and treatment of risk to information assets, as specified in the RM framework.
147
Risk Management Policy
Policy designed to regulate organizational efforts related to the identification, assessment, and treatment of risk to information assets.
148
Residual Risk
Risk to information assets that remains even after current controls have been applied.
149
Risk Appetite
Quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.
150
Risk Appetite Statement
Formal document developed by the organization that specifies its overall willingness to accept risk to its information assets, based on a synthesis of individual risk tolerances.
151
Risk Management Plan
A document that contains specifications for the implementation and conduct of RM efforts.
152
Risk Tolerance/Risk Threshold
Assessment of the amount of risk an organization is willing to accept for a particular information asset, typically synthesized into the organization's overall risk appetite.
153
Zero Tolerance Risk Exposure
Extreme level of risk tolerance whereby the organization is unwilling to allow any successful attacks or suffer any loss to an information asset.
154
Data Classification Scheme
Formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.
155
Information Asset
Within the context of risk management, any collection, set or database of information or any asset that collects, stores, processes, or transmits information of value to the organization. Here the terms data and information are interchangeable.
156
Media
Hardware, integral operating systems, and utilities that collect, store, process, and transmit information.
157
Risk Identification
Recognition, enumeration, and documentation of risks to an organiation's information assets.
158
Threat Assessment
Evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack.
159
Impact
Understanding of the potential consequences of a successful attack on an information asset by a threat.
160
Likelihood
Probability that a specific vulnerability within an organization will be attacked by a threat.
161
Risk Analysis
Determination of the extent to which an organization's information assets are exposed to risk.
162
Uncertainty
State of having limited or imperfect knowledge of a situation, making it less likely that organizations can successfully anticipate future events or outcomes.
163
Risk Evaluation
Process of comparing an information asset's risk rating to the numerical representation of the organization's risk appetite or risk threshold to determine if risk treatment is required.
164
Process Communications
Necessary information flow within and between the governance group, RM framework team, and RM process team during the implementation of RM.
165
Process monitoring and Review
Data collection and feedback associated with performance measures used during the conduct of the process.
166
Bot
Abbreviation for robot, an automated software program that executes certain commands when it receives a specific input. Also zombie.
167
Mail Bomb
Attack designed to overwhelm the receiver with excessive quantities of email.
168
Malware
Computer software specifically designed to perform malicious or unwanted actions.
169
Man-In-The-Middle
Group of attacks whereby a person intercepts a communications stream and inserts himself in the conversation to convince each of the legitimate parties that the attacker is the other communications partner. Some attacks involve encryption functions.
170
Packet Sniffer / Network Sniffer
Software program or hardware appliance that can intercept, copy, and interpret network traffic.
171
Pharming
Redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information.
172
Polymorphic Threat
Malware (a virus or worm) that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
173
Spam
Unsolicited commercial e-mail, typically advertising transmitted in bulk.
174
Spoofing
Technique for gaining unauthorized access to computers using a forged or modified source IP address to give the perception that messages are coming from a trusted host.
175
TCP Hijacking / Session Hijacking
Form of man-in-the-middle attack whereby the attacker inserts himself into TCP/IP-based communications. TCP/IP is short for Transmission Control Protocol/Internet Protocol.
176
Tools, Techniques, and Procedures (TTP)
Means and methods used by adversaries to attack an information asset. Also referred to as tactics, techniques, and procedures.
177
Trojan Horse
Malware program that hides its true nature and reveals its designed behavior only when activated.
178
Worm
Type of malware that is capable of activation and replication without being attached to an existing program.