Cybersecurity Terms Explained¶
1. Threats¶
Definition: Any potential danger that can exploit a vulnerability and cause harm.
Types of Threats:¶
- Cyber Threats: Malware, phishing, ransomware, DDoS attacks.
- Insider Threats: Employees or partners misusing access.
- Advanced Persistent Threats (APT): Stealthy, long-term cyberattacks by skilled hackers.
2. Incidents¶
Definition: Security events that compromise an organizationβs data, operations, or reputation.
Examples of Incidents:¶
- Data breaches β Unauthorized access to sensitive information.
- System intrusions β Hackers gaining access to IT systems.
- Ransomware infections β Malware encrypting data and demanding payment.
- Unauthorized access attempts β Suspicious logins or privilege escalations.
Incident Response Process:¶
- Detect β Identify suspicious activity.
- Analyze β Investigate the nature and impact of the incident.
- Contain β Prevent further spread of the attack.
- Eradicate β Remove the root cause and clean affected systems.
- Recover β Restore systems and ensure they function normally.
- Report β Document the incident for future prevention.
3. Reverse Engineering¶
Definition: The process of analyzing software, malware, or hardware to understand how it works.
Uses in Cybersecurity:¶
- Malware Analysis: Studying malware behavior to develop countermeasures.
- Exploit Detection: Identifying security flaws in software.
- Forensics: Investigating cyber incidents by analyzing malicious code.
4. Triage¶
Definition: The process of analyzing and prioritizing security alerts based on their severity, impact, and urgency.
Triage Process:¶
- Alert Identification β Collect security logs from SIEM, firewalls, IDS/IPS.
- Classification β Determine if the alert is a false positive or a real threat.
- Prioritization β Rank threats based on risk level (low, medium, high, critical).
- Escalation β Forward critical incidents to L2/L3 analysts for deeper investigation.
5. Flag in Cybersecurity¶
Definition: A flag is a marker or indicator used to identify security-related events, vulnerabilities, or challenges.
Types of Flags:¶
-
πΉ CTF (Capture The Flag) β Cybersecurity competitions where participants find hidden "flags" (e.g.,
flag{this_is_a_sample_flag}). -
πΉ Security Alerts & Indicators β Flags indicate suspicious activity in SIEM tools (e.g., a red flag for high-priority threats).
-
πΉ Vulnerability Assessment β Security scanners flag potential vulnerabilities in software or networks ("Flagged for review").
-
πΉ Network & Packet Analysis β TCP/IP flags show the state of a network connection (e.g., SYN, ACK, FIN).
- πΉ Incident Response β Flagged events in logs require further investigation (e.g., multiple failed login attempts flagged as a brute-force attack).¶
Cybersecurity Key Terms¶
- Attack Surface β The total number of entry points an attacker can exploit.
- Zero Trust β A security model where no one is trusted by default.
- Phishing β Fraudulent emails/messages tricking users into sharing sensitive information.
- Malware β Malicious software (e.g., viruses, ransomware, Trojans).
- Ransomware β Malware that locks data and demands payment for access.
- Firewall β A security barrier controlling network traffic.
- SIEM (Security Information and Event Management) β A tool for real-time monitoring and analysis of security events.
- IDS/IPS (Intrusion Detection/Prevention System) β Detects and prevents cyber threats.
- DDoS (Distributed Denial of Service) β An attack that floods a system to disrupt services.
- Endpoint Security β Protecting devices like laptops and smartphones.
- Encryption β Securing data by converting it into unreadable code.
- Penetration Testing β Ethical hacking to find security vulnerabilities.
- Red Team β Simulated attacks to test an organizationβs defenses.
- Blue Team β Defensive security professionals protecting systems.
- Threat Intelligence β Gathering data to predict and prevent cyber threats.
- IAM (Identity and Access Management) β Controlling user access with MFA, RBAC, etc.
- Zero-Day Attack β Exploiting unknown vulnerabilities before a fix is available.
- Social Engineering β Manipulating people into revealing confidential data.
- SOC (Security Operations Center) β A team that monitors and responds to security threats.
- Patch Management β Regular updates to fix security vulnerabilities.