Unpacking the President’s Cybersecurity Executive Order

Page 4

At a Glance: Government Cybersecurity Nationwide 7 Cybersecurity Terms to Know The following terms are vital to understanding today’s public-sector cybersecurity landscape.

1. Advanced persistent threats (APTs): APTs

from email to social media. Although

unauthorized access to computer networks

people by using realistic deceptions.

are cyberthreats that allow bad actors to gain and then avoid detection for long periods of time using stealth. While typically linked to

nation-states, APTs can be any cybercriminals who conduct large-scale intrusions. APTs can

cause serious economic, political and national security damage, making them one of today’s biggest cyberthreats.

2. Endpoints: Endpoints are the various devices — such as laptops and mobile phones — that can connect to IT networks. As the number of

endpoints increases, cybersecurity becomes more difficult for agencies. Endpoint

cybersecurity will only grow more important as remote work’s popularity explodes.

3. Malware: Malware refers to any malicious

software that is created for purposely harming computers, networks and IT. Any software that unintentionally damages these technologies is usually called a bug, glitch or vulnerability.

Malware also comes in many forms, ranging from computer viruses to ransomware.

common, phishing works because it victimizes

5. Ransomware: Ransomware threatens to block access to or leak a victim’s sensitive

data unless a ransom is paid. Increasingly prevalent, this malware can also upend

agencies’ operations. Experts often caution

against paying ransomware ransoms, as this money can fund additional cybercrime.

6. Social engineering: Social engineering

occurs when cybercriminals psychologically manipulate people into performing actions such as revealing confidential information.

At agencies, social engineering can interrupt operations, damage public trust or cost

money. Social engineering can come from

any hostile source inside or outside an agency.

7. Zero trust: Zero trust is a cybersecurity

model designed to automatically distrust every device, user or other entity on an IT network. These entities can access

agencies’ resources only after having their identities verified. Zero trust cybersecurity

4. Phishing: Phishing involves attackers

thus covers everything inside and outside

sending fake messages that trick victims into

a network’s perimeter; this philosophy also

malware on their computers. In recent years,

systems and assets.

revealing sensitive information or installing

helps agencies continuously monitor their IT

cybercriminals have phished using everything

4

A GovLoop Guide


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.