This cloud service model provides computing infrastructure like servers and storage, often abbreviated as three letters ending in "aaS"
What is IaaS (Infrastructure as a Service)
This mobile security practice involves remotely erasing data from a lost or stolen device—like a digital self-destruct button
What is remote wipe
This cryptographic method uses the same key for both encryption and decryption—like having one key that locks and unlocks the same door
What is symmetric encryption
This type of intelligence provides technical details about specific threats, including indicators of compromise and attack techniques
What is tactical threat intelligence
This metric measures the maximum acceptable length of time that a business process can be down after a failure occurs
What is RTO (Recovery Time Objective)
This security architecture approach assumes that threats exist both inside and outside the network, so it verifies everything before granting access
What is Zero Trust
This approach allows employees to use personal devices for work while maintaining security controls—it's a balancing act between convenience and security
What is MDM (Mobile Device Management)
This cryptographic hash function produces a 256-bit hash value and is commonly used in blockchain technology and digital signatures
What is SHA-256
These identifiers help security teams recognize when they're seeing the same threat actor or campaign across different incidents
What are IOCs (Indicators of Compromise)
This backup strategy follows the 3-2-1 rule: keep this many copies of important data, on this many different media types, with this many stored offsite
What is 3-2-1 backup (3 copies, 2 different media, 1 offsite)
This cloud deployment model combines public and private clouds, allowing data and applications to be shared between them
What is hybrid cloud
These everyday connected devices, from smart TVs to refrigerators, often lack proper security and create new attack vectors in homes and offices
What are IoT devices (Internet of Things)
This infrastructure manages digital certificates and public-private key pairs for secure communications—it's like a digital ID card system
What is PKI (Public Key Infrastructure)
This framework by MITRE describes adversary tactics and techniques based on real-world observations of cyberattacks
What is ATT&CK (or MITRE ATT&CK)
This type of site provides a basic facility with power and network connectivity but requires you to bring your own equipment and data
What is a cold site
This process involves moving applications and data from on-premises infrastructure to cloud services—like moving to a new house
What is cloud migration
This mobile app security testing technique involves examining the app's code and behavior without actually running it—like reading a recipe instead of cooking
What is static analysis
This attack against cryptographic systems tries all possible keys until finding the correct one—it's like trying every key on a keychain
What is a brute force attack
This process involves analyzing threat intelligence to determine which threat actors might be behind a cyberattack—like detective work
What is attribution
This exercise tests an organization's incident response and recovery procedures by simulating a real disaster scenario
What is a tabletop exercise (or disaster recovery drill)
This shared responsibility model in cloud computing means both the cloud provider and customer have security obligations—it takes two to tango
What is the shared responsibility model
This type of mobile malware spreads through app stores and can steal personal information or display unwanted advertisements
What is mobile malware (or malicious apps)
This process ensures that a digital certificate has not been revoked and is still valid—like checking if a driver's license is still good
What is certificate validation (or certificate revocation checking)
This type of threat intelligence focuses on understanding the motivations and capabilities of threat actors—it's about knowing your enemy
What is strategic threat intelligence
This agreement between a service provider and customer defines the expected level of service availability and performance
What is an SLA (Service Level Agreement)