Luck based studying Flashcards
(88 cards)
HACKTIVIST:
Grey hat hackers who rally and protest different political and social ideas.
An example of a vulnerability database?
The National Common Vulnerabilities and Exposures (EVE) database.
Publicly available database of all known vulnerabilities.
An example of an early warning system?
Honeynet project creates a warning when someone accesses your data.
An example of a company that shares cyber intelligence?
InfraGard, partnership of the FBI and private sector
ISM Standards?
ISO/IEC 27000 standards are an example of Information Security Management standards.
What group tracks laws enacted to cyber security?
ISACA
Example of an attack that successfully destroyed infrastructure.
Stuxnet
What is scada used for?
Supervisory Control and Data Acquisition
used to control and monitor industrial processes.
BYOD?
Bring Your Own Device
Using a mobile device for company purposes.
What is IoT?
Internet of Things
The collection of technologies that enable the connection of various devices to the Internet.
What is an APT
Advanced Persistent Threat
Continuous computer hack that occurs under the radar against a specific object.
Algorithm attacks?
Can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
Federated identity?
A federated identity links a subject’s electronic identity across separate identity management systems. Exe, using google account ot log into Yahoo.
The most common way to protect federated identity is to tie login ability to an authorized
device.
TDoS
Telephone denial of service attack uses phone calls to tie up a system while not letting any calls get through.
National Institute of Standards and Technologies?
NIST
created a framework for companies and organizations in need of cybersecurity professionals
National Cybersecurity Workforce Framework
includes providing support, administration, and maintenance
Operate and Maintain
National Cybersecurity Workforce Framework
includes the identification, analysis, and mitigation of threats.
Protect and Defend
National Cybersecurity Workforce Framework
Examine cyber events and/or crimes of IT systems
Investigate
National Cybersecurity Workforce Framework
includes specialized denial and deception operations.
Collect and Operate
National Cybersecurity Workforce Framework
review and evaluation of incoming cybersecurity information.
Analyze
National Cybersecurity Workforce Framework
provides for leadership, management, and development
Oversight and Development
National Cybersecurity Workforce Framework
includes conceptualizing, designing, and building secure IT systems.
Securely Provision
DNS, HTTP. and online databases?
Prime targets for cybercriminals and packet sniffing.
Packet forgery?
also called interferes with an established network communication by constructing packets to appear as if they are part of a communication.