Interrelated components working together to collect, process, store, and disseminate information. This includes a feedback mechanism to monitor and control its operation.
What is information systems?
Enables remote users to access computing and storage devices and share data
What is a VPN?
This network security device acts as a barrier between a trusted network and untrusted external networks, monitoring and filtering traffic based on security policies.
What is a firewall?
The act of fraudulently using email to try to get the recipient to reveal personal data
What is phishing?
Confidentiality, Integrity, Availability
What is CIA triad?
Well-designed, organized, and carefully managed collection of data
This security solution collects and analyzes log data from various network and security devices to detect and respond to security incidents in real-time.
What is a Security Information and Event Management (SIEM) system?
This type of cyberattack floods a network or website with excessive traffic, making it slow or unavailable for legitimate users.
What is a Distributed Denial of Service (DDoS) attack?
Cyberattack vector or technique that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware
What is a zero-day exploit?
A network of physical objects (i.e., things) that are embedded with sensors, processors, software, and network connectivity capability
What is IoT?
This type of penetration testing is often performed without prior knowledge of the target system's environment or defenses.
What is black-box testing?
This type of malicious software is designed to block access to a computer system or files until a sum of money is paid to the attacker.
What is ransomware?
A harmful program that resides in the active memory of the computer and duplicates itself
What is a worm?
This test attempts to determine whether a computer can successfully impersonate a human
What is the Turing test?
This open-source tool is commonly used in penetration testing to automate tasks like vulnerability scanning, reporting, and exploitation.
What is Metasploit?
This hacking technique involves analyzing and manipulating data packets in transit between two parties, often used for eavesdropping on communication.
What is packet sniffing?
Iterative process that develops the system in “sprint” increments lasting from two weeks to two months
What is Agile Development?
It's a cryptographic technique used to secure communication over the internet, ensuring data sent between a user's browser and a website remains private and cannot be intercepted easily.
What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?
This well-known web hacking tool is often used for scanning and identifying vulnerabilities in web applications.
What is Burp Suite?
A type of web attack where an attacker inserts malicious SQL code into an input field to manipulate a web application's database.
What is SQL Injection?