Motorola Products
Cloud
Law
Cryptography
Threats
100

Active Eye generated general queries on all events within Active Eye

Pre-Defined Queries

100

The CIA Triad

Confidentiality, Integrity, Availability

100

Who manages COPPA?

The FTC (Federal Trade Commission) 

100

The assurance that someone cannot deny the validity of something, such as a signature or a message.

Non-Repudiation

100

A type of malware that changes its form to avoid detection by antivirus software

Polymorphic Virus

200

Emergency call handling operations with integrated cloud and cyber capabilities.

VESTA

200

The combined risk of multiple individual security flaws or vulnerabilites

Aggregate Risk

200

The persuasive material used in a court's determination of events.

Evidence

200

What type of cryptographic key typically gets used when speed is the priority over increased security?

Symmetric Key

200

The number one vulnerability in cloud environments

Misconfigurations

300

Command center software connects data to immediately expose urgent situations, building an integrated view as incidents unfold.

Command Central

300

A security tool that acts as an intermediary between cloud service providers and users, enforcing an organization's security policies by monitoring and controlling access to cloud applications, ensuring data protection, and preventing unauthorized usage across various cloud services

Cloud Access Security Broker (CASB)

300

The process of electronic data being collected, secured, and analyzed as part of a civil or criminal legal case.

Electronic Discovery (eDiscovery)

300

The practice of representing information within another message or physical object.

Steganography

300

A type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities.

Cyber big game hunting

400

Motorola Solutions established cyber threat Information Sharing and Analysis Organization to provide the public safety community with actionable intelligence to defend against attacks.

Public Safety Threat Alliance (PSTA)

400

The process of encrypting data and then destroying the keys so that the data cannot be recovered.

Crypto-Shredding
400

What is the United States federal law that mandates certain practices in financial record keeping and reporting for corporations?

The Sarbanes–Oxley Act

400

The symmetric-key algorithm that was the first encryption standard to be publicly disclosed by the US government.

The Data Encryption Standard (DES)

400

Animal that represents this country in the threat naming convention is an Ocelot.

Colombia

500

Capture evidence and facilitate undercover voice, text and multimedia communications with real-time location tracking – all from secure apps on your phone.

Callyo

500

a cybersecurity strategy where no user or device is inherently trusted within a network, requiring strict identity verification and continuous evaluation before granting access to any system or data

Zero-Trust
500

a United States federal law that aims to improve cybersecurity by facilitating the sharing of information about cybersecurity threats between the government and private sector entities.

Cybersecurity Information Sharing Act

500

The mode of operation for a block cipher where each possible block of plaintext has a defined corresponding ciphertext value

Electronic Code Book (ECB)

500

Cloud resources or services deployed without IT department approval.

Shadow IT
M
e
n
u