Threat Management Terms and Concepts Flashcards

A false positive occurs when benign activity is incorrectly identified as malicious.
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
Define phishing.
A botnet is a number of internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS).
What is a false positive in threat detection?
Define 'rootkit'.
What is malware?
What is a botnet?
Common sources include open-source intelligence (OSINT), commercial threat intelligence providers, and internal threat data.
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
Name a common source of threat intelligence.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.