20 Cybersecurity Terms You Must Know to Protect Your Enterprise IT Systems

CyberLockIf you’re a seasoned cybersecurity professional, well then “move along folks, there’s nothing to see here”, but if you’re not and you want to make sure you have a solid understanding of the most current terminology used in the world of cybersecurity, read on.

As an introduction to the “Verizon 2015 Data Breach Investigations Report” Verizon Enterprise Solutions offered this in May 2015.  If cybersecurity is not your work-a-day world this is a good review.

Do you know what a detection deficit is? Do you know the difference between a malware and crimeware? These cybersecurity terms might not mean much to you now, but when your enterprise organization is faced with a potential data breach (and it’s typically not a matter of if you get breached, but when), you will want to be able to understand what’s going on.

Detection deficit – Time it takes to discover a breach from the time of compromise.

Malware – Categorical term for various forms of malicious software designed to damage or access computers without knowledge of the owner.

Crimeware – A specific classification of malware designed for the sole purpose of conducting illegal activity.

RAM-scraping malware – Memory-scraping malware that helps attackers find sensitive data that isn’t available through other processes.

Keylogger malware – This malware installs as a result of clicking when browsing the web or downloading software. Once installed, it tracks all of the user’s keystrokes and sends that information to a remote service. This may include logins, emails and anything else typed in to the keyboard.

Exploit kits – Think of it as a pre-packaged cyberattack for dummies. Varying in complexity and targeted vulnerability the key characteristic is the easy-to-use nature of the kit. Unsophisticated attackers who lack expertise in IT or cybersecurity will typically find a user-friendly interface to initiate and manage the attack.

CVECommon Vulnerabilities and Exposures is a dictionary of publicly known information about security vulnerabilities and exposures.

CVSSCommon Vulnerability Scoring System is designed to provide an open and standardized method for rating IT vulnerabilities.

JBOH – Java-Script-Binding-Over-HTTP, which enables an attacker to execute code remotely on Android devices that have affected apps.

IDS or IPS – Intrusion Detection Systems or Intrusion Prevention Systems may come in the form of a software application or device used to monitor a specific system or network for signs of malicious activities.

VERISVocabulary for Event Recording and Incident Sharing is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner.

POS intrusions –Point-of-sale intrusions are attacks that occur on the device transacting a sale. The device may be various forms of digital cash registers used across many industries.

Payment Card Skimmers – Malicious card readers that cybercriminals place on payment terminals, ATM’s or anywhere a credit card swipe occurs to copy the data from the magnetic strip on the card.

Web App Attack – A web-based cyberattack that can take various forms but is commonly defined by its use of the https or http protocol. The attack typically targets the website’s security or performance and, in some cases, can take the entire site down.

DDoS Attack – A distributed denial-of-service attack is an attempt to make an online resource unavailable to users by overwhelming the resource with maliciously generated traffic.

Phishing – An attempt to fraudulently obtain confidential information by posing as a legitimate company, usually a financial organization, via an email message.

Cyberespionage – The act of stealing confidential information digitally stored on computers or networks within a government or organization.

Botnet – Malware infected computers grouped together to form a network and controlled remotely. These networks can be recruited by the controller in a DDoS attack or to send spam emails.

Ransomware – Malware specifically designed to block access to systems or information until a ransom is paid.

Clickfraud – The act of registering artificially inflated clicks within a pay-per-click (PPC) online advertising campaign. Clicks are typically generated through the use of a person or computer program.

Read the original story here.

As always, we welcome your comments and discussion on our Facebook post.

If you’re a seasoned cybersecurity professional, well then “move along folks, there’s nothing to see here”, but if you’…

Posted by Brilliance Security Magazine on Thursday, September 3, 2015

Leave a Reply

Be the First to Comment!

Notify of