Active Eye generated general queries on all events within Active Eye
Pre-Defined Queries
The CIA Triad
Confidentiality, Integrity, Availability
Who manages COPPA?
The FTC (Federal Trade Commission)
The assurance that someone cannot deny the validity of something, such as a signature or a message.
Non-Repudiation
A type of malware that changes its form to avoid detection by antivirus software
Polymorphic Virus
Emergency call handling operations with integrated cloud and cyber capabilities.
VESTA
The combined risk of multiple individual security flaws or vulnerabilites
Aggregate Risk
The persuasive material used in a court's determination of events.
Evidence
What type of cryptographic key typically gets used when speed is the priority over increased security?
Symmetric Key
The number one vulnerability in cloud environments
Misconfigurations
Command center software connects data to immediately expose urgent situations, building an integrated view as incidents unfold.
Command Central
A security tool that acts as an intermediary between cloud service providers and users, enforcing an organization's security policies by monitoring and controlling access to cloud applications, ensuring data protection, and preventing unauthorized usage across various cloud services
Cloud Access Security Broker (CASB)
The process of electronic data being collected, secured, and analyzed as part of a civil or criminal legal case.
Electronic Discovery (eDiscovery)
The practice of representing information within another message or physical object.
Steganography
A type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities.
Cyber big game hunting
Motorola Solutions established cyber threat Information Sharing and Analysis Organization to provide the public safety community with actionable intelligence to defend against attacks.
Public Safety Threat Alliance (PSTA)
The process of encrypting data and then destroying the keys so that the data cannot be recovered.
What is the United States federal law that mandates certain practices in financial record keeping and reporting for corporations?
The Sarbanes–Oxley Act
The symmetric-key algorithm that was the first encryption standard to be publicly disclosed by the US government.
The Data Encryption Standard (DES)
Animal that represents this country in the threat naming convention is an Ocelot.
Colombia
Capture evidence and facilitate undercover voice, text and multimedia communications with real-time location tracking – all from secure apps on your phone.
Callyo
a cybersecurity strategy where no user or device is inherently trusted within a network, requiring strict identity verification and continuous evaluation before granting access to any system or data
a United States federal law that aims to improve cybersecurity by facilitating the sharing of information about cybersecurity threats between the government and private sector entities.
Cybersecurity Information Sharing Act
The mode of operation for a block cipher where each possible block of plaintext has a defined corresponding ciphertext value
Electronic Code Book (ECB)
Cloud resources or services deployed without IT department approval.