Networking
Threat Intelligence
Laws
Definitions
Cyber Attacks
100

The process of verifying a claimed identity of a user, device, or other entity in a computer system

Authentication

100

Anything that has value to an organization

Asset

100

A federal act that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient's consent or knowledge

Healthcare Information Portability Act (HIPPA)

100

The protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information leaks, theft, or damage to hardware, software, and data

Cybersecurity

100

This attack uses a malicious program that is hidden inside a seemingly legitimate one. When the user executes the presumably innocent program, the malware inside can be used to open a backdoor into the system through which hackers can penetrate the computer or network

Trojan Horse 

200

A mechanism for creating an encrypted connection over the Internet from a device to a network

Virtual Private Network (VPN)

200

The collection and analysis of data gathered from  public sources to produce actionable cybersecurity insights

 Open Source Intelligence

200
This act prohibits intentionally accessing a computer  (including any computer used in interstate commerce) without authorization  


Computer Fraud & Abuse Act

200

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Virus 

200

A malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a payment for the decryption key

Ransomware

300

A network security device that monitors traffic to or from your network

Firewall

300

The process of identifying, prioritizing, managing, and monitoring threats to information systems

Risk Management

300

Under this act, the FBI can secretly conduct a physical search or wiretap on American citizens to obtain evidence of crime without proving probable cause, as the Fourth Amendment explicitly requires

USA Patriot Act of 2001

300

A technique through which a cybercriminal disguises themselves as a known or trusted source

Spoofing
300

A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys

Brute Force Attack 

400

A networking device that forwards data packets between computer networks

Router

400

A flaw or weakness that may allow harm to occur to an IT system or activity

Vulnerability

400

This compliance standard sets rules for safeguarding consumer credit data 

Payment Card Industry Data Security Standard (PCI DSS)

400

A measure used to ensure the protection of the secrecy of data, objects or resources

Confidentiality
400

An attack meant to shut down a machine or network, by flooding the targeted host or network with traffic until the target cannot respond or simply crashes

Denial-of-Service (DoS) attack

500

A server application that acts as a middleman between a client requesting a resource and the server providing that resource

Proxy Server

500

A security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated 

Zero Trust

500

This law is managed by the Securities and Exchange Commission (SEC) whose main goal is to protect investors and shareholders from accounting errors, fraudulent practices, to enforce the integrity of financial reporting

Sarbanes-Oxley Act of 2002

500

A server which translates URL or web addresses into their corresponding IP addresses.

Domain Name System (DNS)

500

Breaches in Cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers

Man in the Middle Attack (MITM)

M
e
n
u