This software creates and manages virtual machines on a host system
Hypervisor
Psychological manipulation that tricks users into revealing confidential information
Social Engineering
This ensures that information is available when authorized users need it
Availability
Hardware or software that filters and protects network traffic
Firewall
The first individual to identify and react to a potential incident
First Responder
A software-based emulation of a physical computer system
Virtual Machine (VM)
A malicious program disguised as something useful, granting hackers control
Trojan Horse
This program identifies vulnerabilities in systems processing national security information
TEMPEST
This rule-based filtering method checks if traffic is part of an existing connection
Stateful Inspection
The step in incident response that involves analyzing technical details and root causes
Incident Analysis
This hypervisor runs directly on hardware without an underlying OS
Bare-Metal Hypervisor
A coordinated attack where multiple systems flood a target with traffic
Distributed Denial of Service attack
Electromagnetic interference that can disrupt or expose communications
EMI (Electromagnetic Interference)
This firewall zone allows selected Internet traffic to reach internal servers
Demilitarized Zone (DMZ)
The team responsible for handling and documenting security incidents
Computer Incident Response Team (CIRT)
Securing a system by reducing its surface of vulnerability
Hardening
A hidden software that gives an attacker privileged access to a system
Rootkit
This system protects the transmission of unencrypted classified information
Protected Distribution System (PDS)
This method blocks all traffic by default and only allows trusted connections
Allowlisting
The process of reviewing lessons learned and corrective actions after an incident
Post-Incident Analysis or Postmortem
One disadvantage of virtualization is that it can introduce these risks due to sharing hardware resources
Security Risks
The cybersecurity discipline that identifies and protects classified national security information
Information Security (INFOSEC)
The copper cabling principle that separates encrypted and unencrypted signals
Red/Black Seperation
This combines packet, stateful, and application-layer filtering for deep analysis
Next Generation Firewall (NGFW)
This type of incident occurs when classified information is sent to a lower classification device
Classified Messaging Incident (CMI)