Botnets, backdoors, Trojan Horses, malware, Denial of Service attacks – the language of cybersecurity is filled with distinct jargon to describe its multitude of tools and tactics. Show
What’s it all mean?The Army Criminal Investigation Command (CID) has put together a glossary of basic cybersecurity terminology to help users distinguish spam from cookies and worms from viruses.
SOURCE: https://www.cid.army.mil/assets/docs/lookout/CyberTermsPT2.pdf Download Fact Sheet Is an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or non use?Information extortion occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.
What is an attack in information security?A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.
What is a zero day threat?A zero-day threat (also sometimes called a zero-hour threat) is one that hasn't been seen before and doesn't match any known malware signatures. This makes it impossible to detect by traditional signature-matching solutions.
Which attack is used when a copy of the hash of the user's password has been obtained?A rainbow attack is used when a copy of the hash of the user's password has been obtained. When a match is found, the password has been cracked.
|