Threat Management Terms and Concepts Flashcards

A false negative occurs when malicious activity is not detected by the security systems.
Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities.
What are indicators of compromise (IoCs)?
Threat hunting is a proactive cybersecurity search through networks and endpoints to find malicious actors that have evaded existing security solutions.
IoCs are pieces of data that indicate a potential breach or malicious activity within a network or system.
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
What is vulnerability management?
Explain the term 'exploit'.
Explain threat hunting.
Define phishing.
What is a false negative in threat detection?