Threat Management Terms and Concepts Flashcards

Common sources include open-source intelligence (OSINT), commercial threat intelligence providers, and internal threat data.
Explain the term 'exploit'.
Define 'rootkit'.
Name a common source of threat intelligence.
Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities.
What are indicators of compromise (IoCs)?
What is a botnet?
IoCs are pieces of data that indicate a potential breach or malicious activity within a network or system.
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur.
What is vulnerability management?
A botnet is a number of internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS).