Zero-day, Poor Data Sanitization, Unpatched software, Credential Theft, Vulnerable APIs, Unauthorized Access
What are common vulnerabilities?
Veiled collective of internet sites that are not indexed and are only accessible by a specialized web browser such ToR, Freenet, or Subgraph OS.
What is Dark Web
Common Cyberattack where malicious software executes unauthorized actions on the victim's system.
What is Malware Attack?
Transferring risk to a cloud provider or an insurance company, or a shared disaster recovery site for high availability and disaster recovery planning.
What is Risk Transference?
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
what is internet?
Security testing, in which the assessors simulate rea-world attacks, to identify methods for evading the security features, or controls of an application, system or network.
What is penetration testing?
Can lead to Credential harvesting or finding other information in dumpsters or shredded paper repositories.
What is Dumpster diving?
A popular form of malware that encrypts key files and holds them for ransom.
What is Ransomware?
Infrastructure where capability provided to the consumer is to provision processing, serverless and server-based storage, networks, databases, and other fundamental computing resources where the consumer can deploy and run arbitrary software.
What is Infrastructure as a Service? IaaS
a device that forwards data packets to the appropriate parts of a computer network.
What is Router?
The inability to refute responsibility. Usually accomplished with a public/private key pair cryptosystem and digitally signed certificates between sending and receiving parties.
What is Non-repudiation?
USBS, Firewire, and Memory Cards
What is Removable Device?
A malicious cyber threat actor prevents legitimate subjects from accessing information systems, infrastructure devices, or other network recourses.
What is DoS?(denial-of-service)
What is Platform as a Service? (PaaS)
a computer or computer program which manages access to a centralized resource or service in a network.
What is Server?
Granting an authenticated entity permission to access a resource or perform a specific function.
What is Authorization?
The persons, methods, operations, techniques, systems, or entities that act (or have the potential to act) with intent to initiate, transport, carry out, or in any way support a particular threat or exploit.
What is Agents or Actors?
An attack that floods a server with Internet traffic or internal traffic as well.
What is DDoS?(distributed denial-of-service attack)
A logical design approach used to mitigate the risk of an open network by segmenting infrastructure services.
What is Security Zones.
the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market
What is Sec+
Attacks that happen by just drive-by web surfing, or there's no acceptable use policy or the employee accidentally violated the policy. Could be through emails, webmail, or something stored on a USB fob.
What is Unstructured Attacks?
A common attack that's been run against front-end services like web servers and Microsoft SharePoint that use SQL as a database repository.
What is SQL injection?
An attacker attempts to modify the DNS cache in the wrong way so that all DNS requests return an incorrect response.
What is Cache poisoning?
Network security hardware and or software solution that continuously monitors a zone or multiple zones for malicious activity.
What is intrusion prevention system? (IPS)
the tangible elements of a computer system such as the central processing unit, hard drives, and graphics cards
What is Hardware?