MISC Flashcards

(36 cards)

1
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authn

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authz

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BAS

A

Breach & Attack Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BEC

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BGH

A

Big Game Hunting (BGH) in cybersecurity refers to targeted, sophisticated ransomware attacks against high-value organizations—such as large enterprises, hospitals, and government agencies—for maximum financial gain. These attacks are rarely random, involving reconnaissance to identify critical systems and ensure large ransom payouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BSIMM

A

Building Security in Maturity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

C2

A

Command & Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CISA

A

Cybersecurity and Infrastructure Security Agency | Certified Information Systems Auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CoA

A

Course of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CTA

A

Cyber Threat Intelligence (IAM - Identity & Access Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IOA

A

Indicators of Attack

17
Q

IOC

A

Indicators of Compromise

18
Q

MALOPS

A

Malicious Operations

19
Q

MTTR

A

Mean Time to Resolve

20
Q

PAM

A

Privileged Access Management

21
Q

RBAC

A

Role Based Access Control

22
Q

RBOM

A

Runtime Bill of Materials

23
Q

SBOM

A

Software Bill of Materials

24
Q

SDLC

A

Software Development Lifecycle

25
SD-WAN
Software Defined Wide Area Network
26
SKU
Stock Keeping Unit (Unique identification that defines an element)
27
SRA
Security Response Automation
28
SSS
Stack Smashing Protector (compilers) SWOT - Strengths, Weaknesses, Opportunities, and Threats (SWOT Analysis)
29
TI
Threat Intelligence
30
TOCTOU
Time-of-check. Time-of-use is a race condition security vulnerability where a program checks a resource's state (e.g., file existence, permissions) but the state changes before the program uses it, allowing attackers to manipulate the system. It is common in file system operations or banking applications.
31
TTP
Tactics, Techniques, and Procedures
32
UAC
User Access Control
33
VAP
Very Attacked Person (VAP) is an employee or user who is highly targeted by cybercriminals, typically identified through a high Proofpoint Attack Index score. Unlike VIPs, VAPs are targeted due to their access to sensitive data, financial authority, or public-facing roles, requiring targeted security measures, such as web isolation, to prevent breaches from phishing or malware.
34
VPN
Virtual Private Network
35
YARA
Yet Another Recursive/Ridiculous Acronym (YARA) is an open-source, widely used pattern-matching tool designed for malware classification and threat identification. Developed by Victor Alvarez of VirusTotal in 2013, it allows security researchers to create rules to detect malicious files based on text or binary string patterns. (There is also YARA - L for logs)
36