Computers, data, buildings, devices, etc. belonging to a security perimeter or organization.
Assets
Attacks for fun, known for inexperience
Script Kiddie
Malware that rapidly self-replicates
Worm
Malware that disguises itself as a legitimate piece of software.
Trojan
The CIA Triad stands for these.
Confidentiality, Integrity, Availability
A method of risk assessment that uses costs of assets to determine severity.
Quantitative
Attacks primarily for financial gain.
Cyber Criminal
Obtaining personal data via a scam website.
Pharming
Obtaining personal data via SMS
Smishing
A common security principle that only allows certain users the level of access that is necessary to perform their duties.
Principle of Least Privilege
A method of risk assessment that primarily uses the scope of threat to determine severity.
Qualitative
Funded by nation states for the purposes of cyber warfare.
State Actor
Encrypted
Physical attacks
A kind of encryption that utilizes mathematically linked public and private keys. The public key is sent to the transmitter, but the receiver keeps the private key to themselves for decryption.
Asymmetric Encryption
The likelihood that a vulnerability will be acted upon by a threat or exploit.
Risk
Advanced Persistent Threat
This type of attack involves stalling or stopping service from a victim by flooding its available bandwidth from multiple machines.
DDoS
This kind of malware isn't true malware, but allows for the gathering of user information without their knowledge.
Spyware
Authentication, Authority, Accounting
An attack vector is made of these four things.
Vulnerabilities, Exploits, Threats, Risks
One of the most dangerous attackers are insider threats due to this nature.
Inside Access, Elevated Credentials
These two cybersecurity threats involve human interaction, either directly or with existing, freely available information.
Social Engineering, OSINT
A new vulnerability created from an age of decentralized networking that can involve the simpler devices on our network being unprotected.
Internet of Things (IoT)
The combination of applying firewalls, passwords, locked doors, vestibules, guards, and network monitoring to a system.
Countermeasures/Hardening