O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

20 Cybersecurity Terms and Definitions You Need to Know

21.296 visualizações

Publicada em

Do you know what a detection deficit is? Do you know the difference between a malware and crimeware? These cybersecurity terms might not mean much to you now, but when your enterprise organization is faced with a potential data breach, you will want to be able to understand what’s going on. Once you've understood the jargon, download the 2015 Verizon Data Breach Investigations Report to learn more about the risks you face and how to protect your business: vz.to/DBIR15

Publicada em: Tecnologia, Internet
  • Profollica�'s all-natural formula helped 90% of men reduce hair loss in a clinical trial. ➤➤ https://bit.ly/2N8ZrEt
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • How can I improve my memory and concentration? How can I improve my memory for studying?♣♣♣ https://tinyurl.com/brainpill101
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • How One Woman Discovered the Female Fat-Loss Code Missed by Modern Medicine And Lost 84lbs Using a Simple 2-Step Ritual That 100% Guarantees Shocking Daily Weight Loss... ◆◆◆ https://tinyurl.com/poundinc11
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • The ultimate acne system, Top ranked acne plan for download Unique clear skin strategies ➤➤ http://t.cn/AiWGkfA8
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • The ultimate acne system, Top ranked acne plan for download Unique clear skin strategies ◆◆◆ https://tinyurl.com/ybbtmvh8
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui

20 Cybersecurity Terms and Definitions You Need to Know

  1. cybersecurity terms you need to know before you can secure your enterprise IT systems. 2015 DATA BREACH INVESTIGATIONS REPORT
  2. This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service. © 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PROPRIETARY STATEMENT
  3. 20 CYBERSECURITY TERMS YOU NEED TO KNOW BOTNET WHY IT MATTERS: Malware-infected computers grouped together to form a network and controlled remotely. Unwittingly being part of a botnet can significantly impact network performance.
  4. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Attackers may hijack your system as part of a botnet to target another company, impacting your network performance. CLICKFRAUD Artificially creating bogus clicks within a pay-per-click (PPC) online advertising campaign to inflate the charges to the advertiser.
  5. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Crimeware was involved in 19% of breaches reported in our 2015 DBIR. And in several cases, trade secrets were compromised — so even basic malware can put your corporate data at risk. CRIMEWARE Malware designed for the sole purpose of conducting illegal activity — typically theft.
  6. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Most attacks in 2014 exploited known vulnerabilities, where a patch has been available for months, often years — so it’s important to maintain your awareness of CVEs and keep your patches up to date. CVE Common Vulnerabilities and Exposures (CVE) is a dictionary of publicly known information about security vulnerabilities and exposures.
  7. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: It helps you understand the severity of a particular vulnerability — compared to others. As a result, it can assist you in prioritizing your defenses. CVSS The Common Vulnerability Scoring System (CVSS) is designed to provide an open and standardized method for rating IT vulnerabilities.
  8. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Cyber-espionage is responsible for 82% of breaches involving the disclosure (or suspected disclosure) of intellectual property. CYBER-ESPIONAGE The act of stealing confidential information digitally stored on computers or networks within a government or organization.
  9. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: The disruption to critical systems and time spent on remediation can set your business back days, if not weeks. DDoS ATTACK A distributed denial-of-service (DDoS) attack is an attempt to make an online resource unavailable to legitimate users by overwhelming it with maliciously generated fake traffic.
  10. 20 CYBERSECURITY TERMS YOU NEED TO KNOW DETECTION DEFICIT The time it takes to discover a breach from the time of compromise. WHY IT MATTERS: Our 2015 DBIR found that it took attackers hours or less to compromise systems in 57% of cases where data was stolen. But 58% of the time it took organizations weeks or months to discover a breach had occurred.
  11. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Your data is not just at risk from sophisticated criminal gangs but also from hacktivists and curious kids. EXPLOIT KITS Think of them as pre-packaged cyber attacks for dummies. They provide unsophisticated attackers who lack expertise in IT or cybersecurity with a user-friendly interface to initiate and manage an attack.
  12. 20 CYBERSECURITY TERMS YOU NEED TO KNOW IDS or IPS Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) are software applications or devices used to monitor a specific system or network for signs of malicious activity. WHY IT MATTERS: They provide alerts to suspicious events and can also trigger immediate corrective responses to mitigate disruption to your services.
  13. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: More than 5 billion Android apps are vulnerable to remote attacks, according to FireEye, with JBOH a significant vulnerability. But mobile platforms are still not the preferred attack target. JBOH JavaScript-Binding-Over-HTTP (JBOH) enables an attacker to execute code remotely on Android devices that have affected apps.
  14. 20 CYBERSECURITY TERMS YOU NEED TO KNOW KEYLOGGER MALWARE This malware tracks all of the user’s keystrokes — which may include usernames and passwords — and sends them to a remote service. WHY IT MATTERS: It’s common for criminals to use keyloggers to steal credentials that are then used to gain access to bank accounts and steal money.
  15. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: There were around 170 million malware events in 2014 — that’s five every second. MALWARE Categorical term for various forms of malicious software designed to damage or access computers without knowledge of the owner.
  16. 20 CYBERSECURITY TERMS YOU NEED TO KNOW PAYMENT CARD SKIMMERS Malicious card readers that cybercriminals place on payment terminals, ATMs or anywhere a credit card is swiped or dipped. WHY IT MATTERS: Attackers are getting more sophisticated and are now using thin and translucent skimmers that fit inside the card reader slot.
  17. 20 CYBERSECURITY TERMS YOU NEED TO KNOW PHISHING An attempt to fraudulently obtain confidential information via email by posing as somebody else, usually a financial organization. WHY IT MATTERS: Nearly 50% of users open emails and click on phishing links within the first hour.
  18. 20 CYBERSECURITY TERMS YOU NEED TO KNOW POS INTRUSIONS Point-of-sale (POS) intrusions are attacks that occur on the device transacting a sale, such as mobile payment terminals common in retail and hospitality. WHY IT MATTERS: Nearly 30% of all breaches reported in our 2015 DBIR involved attacks on POS systems by criminals targeting payment card data or seeking a gateway to personally identifiable information held in other systems.
  19. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: RAM scrapers were present in some of the most high-profile retail data breaches in 2014. And new families of RAM scrapers aimed at POS systems were discovered. RAM-SCRAPING MALWARE Malware that accesses data stored in the victim machine’s memory to find sensitive data.
  20. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Being locked out of critical systems could interrupt business as usual. And even if you pay a ransom, there’s no guarantee you’ll regain access. RANSOMWARE Malware specifically designed to block access to systems or information until a ransom is paid.
  21. 20 CYBERSECURITY TERMS YOU NEED TO KNOW VERIS Vocabulary for Event Recording and Incident Sharing (VERIS) is a framework for describing security incidents that provides a common classification to facilitate analysis and reporting. WHY IT MATTERS: The aim is to share information on security incidents so that organizations can learn from each other’s experiences and better measure and manage risk.
  22. 20 CYBERSECURITY TERMS YOU NEED TO KNOW WHY IT MATTERS: Almost 10% of data breaches in 2014 involved web app attacks. Nearly all of these were opportunistic and many made use of stolen credentials harvested from customers’ devices. WEB APP ATTACK A web-based cyber attack that typically uses the https or http protocol to target a website.
  23. NEXT STEPS Now you understand the jargon, download our 2015 Data Breach Investigations Report to learn more about the risks you face and how you can protect your business. http://www.vz.to/DBIR15 2015 DATA BREACH INVESTIGATIONS REPORT HEALTHCARE EDUCATION PUBLIC SECTOR HOSPITALITY FINANCIAL SERVICES RETAIL ENTERTAINMENT PROFESSIONAL MANUFACTURING TECHNOLOGY ADMINISTRATIVE TRANSPORTATION The estimated financial loss from 700 million compromised records shows the real importance of managing data breach risks.Conducted by Verizon with contributions from 70 organizations from around the world. $400 MILLION
  24. © 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. 07/15

×