cmmc cyber security

The New CMMC Standard

Cybersecurity Maturity Model Certification is a much needed adjustment to DFARS that provides risk based compliance to five levels of controls that relates to the Controlled Unclassified Information (CUI) that underpins a defense contractor, sub or prime working in the defense industry.

April 21st, 2020

CyberHoot Newsletter – Volume 5

CyberHoot’s monthly Newsletters summarize the important events from the past month of cybersecurity news. Come to one place and Become More Aware to Become More Secure.

April 15th, 2020

shark tank host phishing attack

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …

March 31st, 2020

Jeff Bezos and the WhatsApp Security Flaw

Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.

February 25th, 2020

CyberHoot Newsletter – Volume 1

The Department of Homeland security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a National Terrorism Advisory Bulletin on Jan. 4th, 2020. This agency only issues such warnings when there is a credible, specific and impending terrorism threat against the United States. In this case, their warning focused primarily upon cybersecurity attacks against US government and business entities in retribution for the killing of Iranian IRGC-Quds Force commander Qassem Soleimani. Iran has a history of cyber-attacks against US Businesses and government entities. Companies should be on high alert and remind employees to be especially vigilant in email phishing attacks amongst other cybersecurity best practices.

January 7th, 2020

Need to Know

Need to Know often gets applied to Classified Top Secret information. However, understanding how it applies could provide insights in how to better protect your SMB’s data and spot errors, omissions, and potentially malicious insiders.

January 6th, 2020

5 Password Manager Myths

The Internet is racing towards 10 Billion publicly documented breached accounts. You can check your own email accounts for breaches and what information was compromised through CyberHoot’s website, inside your …

December 26th, 2019

Access Control Mechanism

Access Control Mechanism

An access control mechanism is a security safeguard (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized …

December 26th, 2019

Attack

An Attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. In other words, the intentional act of attempting …

December 26th, 2019

Sources of Exploits in Software

Exploit

An exploit is a technique to breach the security of a network or information system in violation of security policy.This strategy takes advantage of the application or systems flaw so …

December 26th, 2019

Failure

A failure is the inability of a system or component to perform its required functions within specified performance requirements. For example, a computer shutting down unexpectedly would be considered a …

December 26th, 2019

Cybersecurity

Cybersecurity

Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use …

December 26th, 2019

Event

An event in cybersecurity is an observable occurrence in an information system or network. This sometimes provides an indication that an incident is occurring or at least raise the suspicion …

December 26th, 2019

Indicator

An indicator is an occurrence or sign that an incident may have occurred or may be in progress. Related Term: Precursor Source: CNSSI 4009, NIST SP 800-61 Rev 2 (DRAFT), …

December 24th, 2019

Privacy

Privacy is the assurance that the confidentiality of, and access to, certain information about an entity is protected. In the cyber world, it is about the ability of individuals to …

December 24th, 2019

Penetration Testing

Penetration Testing

Penetration Testing is an evaluation methodology whereby ethical hackers search for vulnerabilities within technology systems and attempt to circumvent the security features of a network and/or information system. This is …

December 22nd, 2019

Phases in Security Incident Handling

Recovery

Recovery refers to phase four (4) in CyberHoot’s view of Cybersecurity Incident Handling. In this phase, incident handlers proceed with activities that seek to restore essential services and operations in …

December 22nd, 2019

Redundant Equipment for Operational Success

Redundancy

Backup technology also requires a plan to execute in an emergency.

December 22nd, 2019

Response

Response is the activities that address the short-term, direct effects of an incident and may also support short-term recovery. In cybersecurity, response encompasses both automated and manual activities. Related Term: …

December 21st, 2019

Security Automation

Security Automation refers to the use of information technology in place of manual processes for cyber incident identification, response and management. Source: DHS personnel If you would like more information …

December 20th, 2019

Software Assurance

Software Assurance is the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that …

December 20th, 2019

Spyware

Spyware is software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner. Related Term: Keylogger Source: CNSSI 4009, NIST SP …

December 20th, 2019

Subject

A subject is an individual, process, or device causing information to flow among objects or a change to the system state; in other words, an active entity. Related Terms: Access, Access …

December 20th, 2019

Supervisory Control and Data Acquisition

Supervisory Control and Data Acquisition (SCADA) is a generic name for a control system architecture comprising computers networked data communications and graphical user interfaces(GUI) for high-level process supervisory management, while …

December 20th, 2019

Suply Chain Risks

Supply Chain

A Supply Chain is a system of organizations, people, activities, information and resources, for creating and moving products including product components and/or services from suppliers through to their customers. Supply …

December 20th, 2019

Supply Chain Risk Management

Supply Chain Risk Management refers to the process of identifying, analyzing, and assessing supply chain risk and accepting, avoiding, transferring, reducing, or controlling it to an acceptable level considering associated …

December 20th, 2019

Symmetric Cryptography

Symmetric Cryptography is a branch of cryptography in which a cryptographic system or algorithms use the same cryptographic key for both encryption and decryption of ciphertext. The keys may be …

December 18th, 2019

System Integrity

System Integrity is the attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. Related …

December 18th, 2019

Tailored Trustworthy Space

Tailored Trustworthy Space refers to a cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security …

December 18th, 2019

Physical Check Fraud Protections

Threat Agent

A Threat Agent is an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.  What they represent is a potential Risk to your organization …

December 18th, 2019

Threat

A threat is a circumstance or event that has or could potentially exploit vulnerabilities or adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), …

December 18th, 2019

Threat Analysis

Threat Analysis in cybersecurity work is where a person identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities and produces findings to help initialize or …

December 18th, 2019

Threat Assessment

Threat Assessment

A Threat Assessment is the product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, …

December 18th, 2019

Ticket

A ticket, in access control, is data that authenticates the identity of a client or a service and, together with a temporary encryption key (a session key), forms a credential. …

December 18th, 2019

Traffic Light Protocol

Traffic Light Protocol is a set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience. The fundamental …

December 18th, 2019

Unauthorized Access

Unauthorized Access is any access that violates the stated security policy. This can be done via an employee accidentally attempting to access a program that only administrators are allowed to …

December 18th, 2019

Virus

A virus is a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. An example …

December 18th, 2019

Weakness

A weakness is a shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities. Related …

December 18th, 2019

Vulnerability

A vulnerability is a characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible …

December 18th, 2019

Allow List

Allow List, Permit List (Deprecated: whitelist)

Whitelist and Blacklist are racially charged terms. Therefore, modern enlightened computer administrators now refer to these technical solutions as Allow Lists and Deny Lists or Allowed Sites and Blocked Sites. …

December 18th, 2019

Work Factor

A Work Factor is an estimate of the effort or time needed by a potential adversary, with specified expertise and resources, to overcome a protective measure. Defense-in-Depth Cybersecurity programs seek …

December 18th, 2019

Worm

A worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. Source: CNSSI 4009 If you would like to learn more about this topic, watch this …

December 18th, 2019

White Team

A White Team is a group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems. Related Terms: Blue …

December 17th, 2019

Bitcoin

Bitcoin is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and …

December 17th, 2019