Define Key Terms
Define the following key terms from this chapter and check your answers in the glossary:
tactics, techniques, and procedures (TTPs)
malware
virus
worm
Trojan
ransomware
advanced persistent threat (APT)
distributed denial-of-service (DDoS)
synchronization (SYN) flood
User Datagram Protocol (UDP) flood
Hypertext Transfer Protocol (HTTP) flood
man-in-the-middle (MITM) attack
side-channel attack
intrusion detection system (IDS)
network intrusion detection system (NIDS)
host-based intrusion detection system (HIDS)
intrusion prevention system (IPS)
firewall
packet filtering firewall
proxy, application-aware firewall
web-application filtering firewall (WAF)
next-generation firewall (NGFW)
scanning
penetration test