Page:Cyber Threats to Elections Lexicon 2018 CTIIC.pdf/23

From Wikisource
Jump to navigation Jump to search
This page has been validated.

Distributed Denial-of-Service (DDoS) Attack
A type of cyber attack designed to prevent users from accessing a network-connected service by sending simultaneous illegitimate requests from numerous sources. Data is sent to overload a network’s resources.

Encoding
The process of translating binary characters into representing characters (e.g., letters and numbers).

Encryption
The conversion of plaintext, by means of a defined system (e.g., a “cipher”), so that it is unintelligible to an unauthorized recipient.

Exfiltration
The transfer, either electronically or physically, of information from a victim system by a threat actor without the data owner’s permission.

Exploitation
The act of extracting and gathering intelligence data, often from a cyber attack or cyber espionage.

Hop Point
A compromised or commercially purchased intermediary system that is used as a proxy to disguise the attacker’s true point of origin.

Information Security
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability.

Insider Threat
The risk that one or more individuals with the access to and/or internal knowledge of a company, organization, or enterprise would exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with the intent to cause harm.