cmmc cyber security

The New CMMC Standard

Cybersecurity Maturity Model Certification is a much needed adjustment to DFARS that provides risk based compliance to five levels of controls that relates to the Controlled Unclassified Information (CUI) that underpins a defense contractor, sub or prime working in the defense industry.

shark tank host phishing attack

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …

Jeff Bezos and the WhatsApp Security Flaw

Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.

CyberHoot Newsletter – Volume 1

The Department of Homeland security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a National Terrorism Advisory Bulletin on Jan. 4th, 2020. This agency only issues such warnings when there is a credible, specific and impending terrorism threat against the United States. In this case, their warning focused primarily upon cybersecurity attacks against US government and business entities in retribution for the killing of Iranian IRGC-Quds Force commander Qassem Soleimani. Iran has a history of cyber-attacks against US Businesses and government entities. Companies should be on high alert and remind employees to be especially vigilant in email phishing attacks amongst other cybersecurity best practices.

Need to Know

Need to Know often gets applied to Classified Top Secret information. However, understanding how it applies could provide insights in how to better protect your SMB’s data and spot errors, omissions, and potentially malicious insiders.

5 Password Manager Myths

The Internet is racing towards 10 Billion publicly documented breached accounts. You can check your own email accounts for breaches and what information was compromised through CyberHoot’s website, inside your …

Access Control Mechanism

Access Control Mechanism

An access control mechanism is a security safeguard (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized …

Attack

An Attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. In other words, the intentional act of attempting …

Sources of Exploits in Software

Exploit

An exploit is a technique to breach the security of a network or information system in violation of security policy.This strategy takes advantage of the application or systems flaw so …

Failure

A failure is the inability of a system or component to perform its required functions within specified performance requirements. For example, a computer shutting down unexpectedly would be considered a …

Cybersecurity

Cybersecurity

Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use …

Event

An event in cybersecurity is an observable occurrence in an information system or network. This sometimes provides an indication that an incident is occurring or at least raise the suspicion …

Indicator

An indicator is an occurrence or sign that an incident may have occurred or may be in progress. Related Term: Precursor Source: CNSSI 4009, NIST SP 800-61 Rev 2 (DRAFT), …

Privacy

Privacy is the assurance that the confidentiality of, and access to, certain information about an entity is protected. In the cyber world, it is about the ability of individuals to …

Penetration Testing

Penetration Testing

Penetration Testing is an evaluation methodology whereby ethical hackers search for vulnerabilities within technology systems and attempt to circumvent the security features of a network and/or information system. This is …

Phases in Security Incident Handling

Recovery

Recovery refers to phase four (4) in CyberHoot’s view of Cybersecurity Incident Handling. In this phase, incident handlers proceed with activities that seek to restore essential services and operations in …

Response

Response is the activities that address the short-term, direct effects of an incident and may also support short-term recovery. In cybersecurity, response encompasses both automated and manual activities. Related Term: …

Security Automation

Security Automation refers to the use of information technology in place of manual processes for cyber incident identification, response and management. Source: DHS personnel If you would like more information …

Software Assurance

Software Assurance is the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that …

Spyware

Spyware is software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner. Related Term: Keylogger Source: CNSSI 4009, NIST SP …

Subject

A subject is an individual, process, or device causing information to flow among objects or a change to the system state; in other words, an active entity. Related Terms: Access, Access …

Supervisory Control and Data Acquisition

Supervisory Control and Data Acquisition (SCADA) is a generic name for a control system architecture comprising computers networked data communications and graphical user interfaces(GUI) for high-level process supervisory management, while …

Suply Chain Risks

Supply Chain

A Supply Chain is a system of organizations, people, activities, information and resources, for creating and moving products including product components and/or services from suppliers through to their customers. Supply …

Supply Chain Risk Management

Supply Chain Risk Management refers to the process of identifying, analyzing, and assessing supply chain risk and accepting, avoiding, transferring, reducing, or controlling it to an acceptable level considering associated …

Symmetric Cryptography

Symmetric Cryptography is a branch of cryptography in which a cryptographic system or algorithms use the same cryptographic key for both encryption and decryption of ciphertext. The keys may be …

System Integrity

System Integrity is the attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. Related …

Tailored Trustworthy Space

Tailored Trustworthy Space refers to a cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security …

Physical Check Fraud Protections

Threat Agent

A Threat Agent is an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.  What they represent is a potential Risk to your organization …

Threat

A threat is a circumstance or event that has or could potentially exploit vulnerabilities or adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), …

Threat Analysis

Threat Analysis in cybersecurity work is where a person identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities and produces findings to help initialize or …

Threat Assessment

Threat Assessment

A Threat Assessment is the product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, …

Ticket

A ticket, in access control, is data that authenticates the identity of a client or a service and, together with a temporary encryption key (a session key), forms a credential. …

Traffic Light Protocol

Traffic Light Protocol is a set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience. The fundamental …

Unauthorized Access

Unauthorized Access is any access that violates the stated security policy. This can be done via an employee accidentally attempting to access a program that only administrators are allowed to …

Virus

A virus is a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. An example …

Weakness

A weakness is a shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities. Related …

Vulnerability

A vulnerability is a characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible …

Work Factor

A Work Factor is an estimate of the effort or time needed by a potential adversary, with specified expertise and resources, to overcome a protective measure. Defense-in-Depth Cybersecurity programs seek …

Worm

A worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. Source: CNSSI 4009 If you would like to learn more about this topic, watch this …

White Team

A White Team is a group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems. Related Terms: Blue …

Bitcoin

Bitcoin is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and …