When one form of logging in once just isn't enough
The modern digital equivalent to moat and drawbridge
that protects your castle
ENCRYPTION - What you should ALWAYS do to your data at rest and in
Happens to everyone sooner or later, although no one wants to admit it
You'll have to go to the DMV to get a new license
because of this
You want to give the least amount of this to users
Baiting a hook, throwing it out via email, and waiting
for somebody to swallow it
You use these to combat adversaries and they use them
against you.
Like a VHS tape of your network traffic
a well-established method used by both defenders and
adversaries to hide open ports from access
identification unique to every human
Movie quote, "Do you want to play a game?"
The hot beverage that keeps a SOC running 24/7
a device that is controlled by someone else, usually for
nefarious purpose
It shut down Iran's nuclear program, for a while, by
controlling the speed of spin of centrifuges
any attempt to expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use of an
asset
Used to mean PC's, but now means phones, tablets,
watches, and more
One of the most common ways to put data into Devo.
Biometric used to "see" if you should have access
a structured language for describing cyber threat
information so it can be shared, stored, and analyzed in a
consistent manner.