This type of attack uses instant messaging to send SPAM messages.
What is SPIM?
This detects & prevents unauthorized access to, or sending of, sensitive data.
What is DLP?
This monitors a host device for intrusions & alerts the admin.
What is a HIDS?
theHarvester is a tool used for this type of activity.
What is OSINT?
This protects the PII of EU & EEA citizens.
What is the GDPR?
This attack uses a botnet to remotely attack targets.
What is DDoS?
This provides a cloud-based execution environment for custom code.
What is PaaS?
Dynamic code analysis may include this to ensure that a normal end-user usability.
What is UAT?
This offers a customizable dashboard to monitor network events in real-time.
What is a SIEM?
This NIST framework has 6 phases that sets security requirements for federal agencies.
What is CIS?
A boot sector virus attaches itself to this to avoid detection.
What is MBR?
This flexible computing device is meant to be programmed by the end user.
What is an FPGA?
This combines authentication & authorization into a single solution.
What is IAM?
This type of traffic can be used to collect VOIP call metadata, including a record of calls made.
What is SIP?
These SSAE reports are security assessment & auditing standards.
What are SOC reports?
This wireless security protocol is the oldest & least secure.
What is WEP?
This type of ICS focuses on data-gathering & is event-driven.
What is SCADA?
This is an insecure plaintext password-login mechanism.
What is PAP?
This framework lays out the main activities related to digital forensics.
What is EDRM?
This point is where a manufacturer stops creating a product.
What is EOL?
This tool gathers data about user habits & activities to detect threats & attacks.
What is UEBA?
This type of encryption key is used to encrypt another encryption key.
What is KEK?
This entity sends the CA a formal CSR before the CA builds, signs, & issues a certificate.
What is the RA?
This SOP details how to detect, prevent, & respond to incidents.
What is an IRP?
This company exec crafts & implements the company data protection & privacy policy.
Who is the DPO?