Cyber Security -General Terms

Ace your homework & exams now with Quizwiz!

Script kiddie

A person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Cyber kill chain

A phase-based model to describe the stages of an attack, which also helps inform ways to prevent such attacks.

White Hat Hacker

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.

Threat agent

An individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company. Threat Agent = Capabilities + Intentions + Past Activities.; person who has the abilty for a threat

Insiders

An insider is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise.

Threat vector

An threat vector is a path or means by which a hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities

Authentication

Authentication is any process by which a system verifies the identity of a User who wishes to access it. Since Access Control is normally based on the identity of the User who requests access to a resource, Authentication is essential to effective Security.

BYOD

Bring your own device. Can be critical as networks need to be protected from attacks from personal computers.

Cybercrime

Criminal activity or a crime that involves the Internet, a computer system, or computer technology: identity theft, phishing, and other kinds of cybercrime.

Authorization

The action of giving permission to access information.

Information security

The set of business processes that protects information assets regardless of how the information is formatted or whether it is being processed, is in transit or is being stored.

Gray Hat Hacker

The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

Cyberterrorist

the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.

Physical security

Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

Asset

Property owned by a person or company, regarded as having value and available to meet debts, commitments, or legacies.

Cyber security

Protection against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

Risk transference

Risk Transference refers to the shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

Risk mitigation

Risk mitigation is defined as taking steps to reduce adverse effects. There are four types of risk mitigation strategies that hold unique to Business Continuity and Disaster Recovery. It's important to develop a strategy that closely relates to and matches your company's profile.

Hacktivist

A computer hacker whose activity is aimed at promoting a social or political cause.

Black Hat Hacker

A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things.


Related study sets

Chapter 01 The Core Principles of Economics

View Set

obstetric sonography PRACTICE QUIZ

View Set

Chapter Conducting Questions: Previous Question

View Set

Chapter 5 Selecting a Topic and Purpose

View Set

Physics Final Conceptual Questions

View Set

U13LO6: Compute the tax-equivalent yield of municipal bonds

View Set