Boost your cybersecurity knowledge with these 18 terms to learn - Technical.ly DC

Business

Apr. 30, 2019 4:39 pm

Boost your cybersecurity knowledge with these 18 terms to learn

In the interest of cybersecurity as a growing industry, we asked local leaders in the field about some of the terms we've been hearing during Growing Industries month.

Expand your cybersecurity vocabulary.

(Information security concept by Ensuper via Shutterstock)

Cybersecurity is drawing interest, both as an going concern to protect technology from attacks and a growing industry in the region. It’s an area that’s gaining a foothold in the tech community and contributing to job growth.

Over the course of our reporting, we’ve found this field has some specific language that can be important when it comes to understanding where potential threats may lie, or what a company does.

So, as we focused on cybersecurity this month, we in D.C. and Baltimore decided to ask local leaders in the field about some of the terms we’ve been hearing — and one of those was “cybersecurity” itself. The following is a look at our first compilation of cybersecurity terms to know. It’s by no means a complete glossary (yet!), but consider it a snapshot of some of the key terms that often come up in conversation at networking events and interviews.

Here’s a look:

Application security

  • “A process for enhancing the security posture of software. The process typically involves: threat modeling, design reviews, finding security bugs through tools/testing (IAST, RASP, SAST, DAST, manual, etc), and then fixing the security bugs in the software development lifecycle (SDL). Application security is being adapted in to more streamlined ‘DevSecOps’ processes in today’s development world.” — David Lindner, director of application security at Contrast Security

Cloud

  • “Emerging technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.” — Diego Salinas, assistant director of cybersecurity accelerator MACH37

Cyber exposure

  • “An emerging discipline used to accurately understand and reduce cyber risk. This approach is key to helping companies safeguard valuable assets and become more cyber secure by providing holistic visibility into the various digital compute platforms and assets that make up the modern attack surface. The Cyber Exposure process takes the whole life cycle into account, allowing companies to determine where they are exposed, where they should prioritize based on risk and how they are reducing exposure over time.

A Cyber Exposure approach builds on the roots of vulnerability management for traditional IT systems, but also includes:

Advertisement

  • Live discovery of every modern asset across any computing environment
  • Continuous visibility into where an asset is secure, or exposed, and to what extent
  • Added context to help prioritize and select the appropriate remediation technique
  • A framework to accurately represent and communicate cyber risk to business
  • Tools to apply Cyber Exposure data as a key risk metric for strategic decision support”

Jill Shapiro, senior director of global government affairs at Tenable

Cybersecurity roadmap

  • “A cybersecurity roadmap helps businesses align their planned cybersecurity investments with their future business goals. Once businesses know which security risks threaten their growth, they can make more strategic cybersecurity investments.” — Lauren Maffeo, GetApp

Data archiving

  • “Data archiving involves storing historical data on a separate storage system. Data should be archived when it’s no longer being used, but must be saved for record-keeping and/or to maintain regulatory compliance.” — Maffeo

Endpoint

  • “Endpoint refers to any device that connects to a network and can serve as an entry point for security threats. Devices such as smartphones, tablets and laptops are all endpoints that must be secured to block unauthorized access to company networks. Endpoint security also can prevent the internal theft of sensitive data.” — Leo Minegishi, director of information security, Summit Business Technologies

Firmware

  • “A specific class of computer software, firmware provides the low-level control for the hardware of an IoT device.” — Terry Dunlap, cofounder and chief strategy officer, ReFirm Labs

IP Address

  • “A unique series of numbers that identifies a device connected to the Internet or a local network. Allows systems to be recognized by other systems via Internet Protocol.” — Salinas

IoT Security

  • “Internet of Things (IoT) security includes both the physical security of internet-connected devices and the network security to which each IoT ‘thing’ connects.” — Dunlap

Known exploits

  • “Exploits are a program or piece of computer code that takes advantage of a security flaw in an application or system. Known exploits are exploits that have been identified, documented and publicly reported by security researchers.” —Dunlap

Malware

  • “Malware, or malicious software, is any program or file that is written with the intent of doing harm to data, devices or to people. Common types of malware include computer viruses, Trojan horses and spyware.” — Dunlap

MSSP

  • “MSSP stands for ‘managed security service providers.’ They provide outsourced monitoring and management of security devices and systems. MSSP can be outsourced or managed in-house. Services include firewall management, vulnerability scanning, and anti-viral protection.” — Maffeo

Phishing

  • “Hackers use this technique to ‘trick’ people into giving them sensitive information. Can come as emails with sketchy links, or be websites that look legit but are fake sites to obtain your information.” — Salinas

Ransomware

  • “A form of malware that infects your device and prevents or limits users from accessing their systems until a ‘ransom’ is paid.” — Salinas

Spear phishing

  • “A technique used by attackers to obtain sensitive information. Traditionally executed using highly targeted email messages designed to trick people into divulging personal or confidential data.” — Paul Taylor, Point3 Security

Third-party risk

  • “Third-Party Risk, or supply chain risk, is the probability of a cybersecurity event affecting your company that is caused by a third party, such as a vendor partner, supplier, or contractor with whom you do business. The greater the number of partners, the higher the risk.” — Mohamoud Jibrell, CEO, NormShield

Virtual private network

  • “A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.” — Salinas

Zero day exploits

  • “A cyberattack on a software or hardware vulnerability before it can be detected and fixed. Attackers exploit the security flaw by releasing malware that can take control of your computer, steal your data, corrupt files, access your contacts, and send spam messages from your account.” — Leo Minegishi, director of information security, Summit Business Technologies
  • Dunlap points out that these are also known as “unknown exploits,” adding: “These kinds of exploits are particularly dangerous because a user’s security can be breached even when using fully updated software.”

What’d we miss? Email us to contribute — stephen@technical.ly (Baltimore) or michelai@technical.ly (D.C.).

You must appreciate accurate, relevant and productive community journalism.  Support this sort of work from professional reporters with seasoned editors.  Become a Technical.ly member for $12 per month -30-
JOIN THE COMMUNITY, BECOME A MEMBER
Already a member? Sign in here

Advertisement

Accenture has acquired a Seattle-based cybersecurity company

SyncDog forms an alliance with the Virginia Economic Development Partnership

This Baltimore-based venture capital firm is looking to invest in D.C.-area startups

SPONSORED

DC

Building a data acquisition system? Don’t make this mistake

DC, SF, NYC

Nava

Experienced Software Engineer – Backend

Apply Now
Washington DC

The Washington Post

Back End Developer/ Engineer – Arc Engineering

Apply Now
DC

CasaOne

Washington DC Operations Associate

Apply Now

Virginia-based Distil Networks is set to be acquired by a cybersecurity firm

This California-based cybersecurity company just acquired Verodin

Undergrads built real-world cyber solutions at the latest InNOVAtion Hackathon

SPONSORED

DC

This fast-growing SaaS company aims to be a force for change in the energy industry

DC

Factory Four

Client Service Analyst

Apply Now
Washington, DC

Nava

Infrastructure Engineer (DC, SF, NYC)

Apply Now
DC

Process Street

People & Operations Manager

Apply Now

Sign-up for daily news updates from Technical.ly Dc

Do NOT follow this link or you will be banned from the site!