The Limited Times

Now you can see non-English news...

What is a "total virus"? Get to know the AB of cyber - Walla! Technology

2021-08-26T15:02:03.993Z


"Day Zero", "Sock Doll", "Cyber ​​Terrorism". If these terms remind you of war, you are not wrong, but what do they mean? Just before the start of the school year, Yotam Gutman, SentinelOne's Marketing Director, teaches you the AB of the technology campaign


  • technology

  • Cyber

What is a "total virus"?

Get to know the AB of cyber

"Day Zero", "Sock Doll", "Cyber ​​Terrorism".

If these terms remind you of war, you are not wrong, but what do they mean?

Just before the start of the school year, Yotam Gutman, SentinelOne's Marketing Director, teaches you the AB of the technology campaign

Tags

  • Cyber

Yotam Gutman

Thursday, 26 August 2021, 17:52 Updated: 17:55

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

Cyber ​​warfare is a hot field.

Cyber ​​events occur for two main reasons: economic and political.

On the one hand, account hijackings for financial bargaining purposes, and on the other hand international damages.



To better understand the nature of actions, a number of basic terms need to be explained.

The opening of the school year gives a good opportunity to get to know the AB of this world.

More on Walla!

NEWS

Three things that will give the upcoming holiday season a special feeling

To the full article

North Korea appears as an entry here.

Hmmm, I wonder why (Photo: Reuters)

  • A: Asgara.

    A process in which a security researcher reports to a body operating a particular site or system a vulnerability in that system.

    The extraction process allows the body to receive the information about the weakness and correct it before it becomes public domain.

  • B.

    Sock Doll:

    A fictitious profile on social media, used to contact a potential victim while impersonating another.

    A practice that is used by intelligence organizations and powerful attackers.

  • third.

    Information theft:

    One of the main purposes of a cyber attack is to steal sensitive information that is on the victim's computers.

    This information may include user information, credit card information, medical records and intellectual property information.

    The stolen information can be sold in the dark web or used for future attacks.

  • D.

    Phishing:

    Sending a malicious email to a potential victim whose purpose is to get him to download a malicious device (AA) to his computer or reveal user information.

  • God.

    Social engineering.

    Using psychological warfare and negotiation methodologies, usually while impersonating another (aka "sock doll"), to make the victim share sensitive information such as a password or user information, without using an assault tool or actually hacking into his computer.

The attackers identified a weakness?

Start praying (Photo: ShutterStock)

  • and.

    Total Virus:

    An online database that uploads millions of examples of evil from around the world.

    Allows you to easily and efficiently check if a file or link is malicious, and allows for in-depth malicious research.

  • P.

    Information leakage: A

    process in which information leaves the organization unintentionally - either due to malicious action (aka "information theft") or due to the negligence of users in the organization (for example - sending sensitive information to external suppliers).

  • H.

    Weakness:

    A software malfunction caused by a developer who can exploit attackers to infiltrate a computer running the same software.

    Security researchers who discover vulnerabilities can lock them up.

  • ninth.

    Cyber-terrorism:

    Using the cyber dimension to carry out terrorist acts by individuals or organizations (other than governmental organizations or criminal organizations).

    These actions can be denial of service attacks on websites, hacking, theft and publication of sensitive information.

  • .

    Day Zero:

    Weakness in software that is not yet known to anyone.

    Such a weakness can be exploited by attackers without the possibility of defending against it.

    Such weaknesses are valuable and are sold in the dark web or developed by powerful attackers for their use.

No, we do not mean this lovable thing in "stocking doll" (Photo: ShutterStock)

  • about.

    Infidelity:

    Damage that encrypts the information on the computer or server and effectively neutralizes the proper operation of the business or organization.

    Crackers who attacked the organization will provide encryption keys in exchange for paying a ransom in cryptocurrency.

  • To.

    Cyber ​​warfare:

    The cyber dimension is a dimension that is added to the dimensions of kinetic warfare between countries and powers.

    The nature of the activity in this dimension allows countries to carry out intelligence gathering operations, psychological warfare and sabotage, with a low risk of degenerating into a kinetic conflict and with the possibility of denial.

  • M.

    Cyber ​​Intelligence: Cyber

    Intelligence The practice of gathering and processing knowledge generated regarding cyber threats, attack groups, their behavior and their tools.

    Its purpose is to understand, anticipate and identify threats as close as possible to their formation and as far as possible from the target (in space and time).

  • N.

    Malware:

    Malware designed to damage digital information, operating system or hardware of computer systems, and even cause physical damage to computer integrated systems.

  • S. Password:

    The most basic means of identity verification and access control in the world of information security.

    The password may be a word, a short phrase (usually meaningless), a sequence of digits or some characters. Cracking passwords is a necessary step in most cyber attacks.

  • E.

    Software Update: Software

    vendors frequently update software that is in the hands of organizations and consumers.

    These updates are distributed to the market in a concentrated manner every certain period of time.

    Outdated software contains unrepaired vulnerabilities and makes it easier for attackers to infiltrate an organization.

As in any battle, intelligence is the key to success (Photo: ShutterStock)

Yotam Gutman (Photo: Sentinel One)

  • F.

    Cracker:

    A person with knowledge of computers and their operating systems, who is able to find security vulnerabilities and hack into computer systems or websites.

    In the past, these people were required to have the skill of cracking codes and passwords, hence the nickname "Cracker".

  • צ.

    North Korea: The

    dictatorship of North Korea is the country that makes the most intensive use of cyber warfare for military as well as economic purposes - to generate income while suffocating under Western sanctions.

  • K.

    Assault Group:

    The cyber world is divided into groups of attackers with distinct characteristics - origin, language, geography, political

    aggression

    , military unit, financial or intelligence motivation and more.

    The attack group is identified by locating indicative signs (such as the use of language or specific tools) and thus makes it easier to understand the motivation behind the attack and plan how to protect or contain the threat.

  • R.

    Evil:

    Malicious software that performs different actions than the user intended.

    These actions can include collecting information on the local computer or network, mapping users, collecting information and user information, stealing sensitive information and even aggressive actions such as encrypting the information, deleting it or causing physical damage.

  • That.

    Supply Chain:

    The modern software world is made up of different layers that rely on each other, and include a mix of open source software, commercial software and dedicated / private software.

    Weakness or error in one software component affects all those above it in the chain.

    Sophisticated attackers take advantage of this supply chain to infiltrate malware through small software vendors and through them to break into large, protected entities.

  • A.

    Data communication:

    The Internet is based on communication between computers that is performed in different protocols.

    This communication is vulnerable to various types of attacks that exploit the information traffic to prevent access to various sites.

Yotam Gutman is the marketing director of the cyber company SentinelOne.

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

Source: walla

All tech articles on 2021-08-26

You may like

Life/Entertain 2024-02-01T10:59:11.807Z

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.