Types of Cyber Attacks
Cybersecurity Tools
Cybersecurity Managed Services
Cybersecurity Professional Services
Cybersecurity Buzzwords
100

This is email based cyberattack that tricks users into giving up personal information

What is Phishing?

100

This type of software scans endpoints for vulnerabilities?

What is a Vulnerability Scanner?

100

This service provides a comprehensive picture of vulnerabilities for prioritization to facilitate timely remediation of vulnerabilities across the environment.

What is Managed Vulnerability Management (MVM / AKA VMaaS)?

100

This authorized simulation of a cyber attack helps to identify exploitable vulnerabilities in your systems.

What is a Penetration Test?

100

This critical cybersecurity capability responsible for monitoring, detection & response, commonly abbreviated SOC

What is Security Operations Center?

200

This type of malware encrypts files and demands payment for decryption.

What is ransomware?

200

This security tool continuously monitors endpoints for suspicious activities and provides real-time detection of threats.

What is Endpoint Detection and Response (EDR)?

200

This service protects endpoints, such as desktops, servers, laptops, and virtual machines, extending security from known signatures to patters to detect & prevent sophisticated attacks on the endpoint.

What is Managed Endpoint Detection & Response (MEDR)?

200

This services assesses Active Directory hardening, endpoint CIS compliance, vulnerabilities, and provides a one-time dark web scan.

What is a Foundational Security Assessment (FSA)?

200

A cybersecurity framework operating under the principle "Never trust, always verify"

What is Zero-Trust?

300

This attack targets business by compromising or impersonating executive email accounts, often to authorize fraudulent wire transfers.

What is Business Email Compromise (BEC)?

300

Security Teams use this technology to collect, analyze and correlate security alerts from multiple sources.

What is a Security Information and Event Management system (SIEM / aka XDR)?

300

This service is designed to establish a base level of cybersecurity via an upfront Foundational Security Assessment (FSA) paired with quarterly vulnerability scans and consultation to enable organizations establish a baseline of security.

What is Security Advisory as a Service (SAaaS)?

300

This facilitated exercise tests your knowledge and execution of your incident response plan to help enable collaboration and identify gaps in a lower stress environment.

What is a Tabletop Exercise?

300

A business model where ransomware developers lease their malware to affiliate who conduct attacks and share profits.

What is ransomare-as-a-service (RaaS)?

400

These attacks trick individuals into breaking normal security procedures by exploiting human psychology rather than technological vulnerabilities.

What is social engineering?

400

This technology creates a logical isolated virtual environment to safely execute suspicious files or code?

What is a sandbox?

400

This service offers a combination of expertise and technology to detect dynamic threats quickly across your entire technology ecosystem.

What is Managed Detection & Response (MDR)?

400

This analysis identifies discrepancies between your current security posture and desired state against regulatory requirements or security frameworks.

What is a gap assessment (aka risk assessment)?

400

Proactively searching through networks to detect advanced threats that evade existing security solutions.

What is threat hunting?

500

This increasingly comon attack method targets trusted third-party vendors or software providers to compromise their customers, allowing attackers to affect multiple organizations with a single breach.

What is Supply Chain Attacks?

500

This cloud security technology can identify and remediate misconfigurations.

What is Cloud Security Posture Management (CSPM)?

500

This service actively searches, scans, and collects data from dark web sources to identify potential cybersecurity threats and stolen information.

What is dark web monitoring?

500

This emergency services helps organizations rapidly investigate, contain and remediate active security breaches to minimize organizational damage.

What is Incident Response?

500

Identifying, analyzing, and monitoring an organization's digital attack surface.

What is Attack Sruface Maangement (ASM)?

M
e
n
u