IT Security Agreements and Vulnerability Assessment

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts from IT security agreements, vulnerability assessments, and security tools.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

MOU (Memorandum of Understanding)

An informal, non-binding agreement expressing the intent to collaborate, often includes confidentiality clauses.

2
New cards

BPA (Business Partnership Agreement)

A common model in IT involving partner agreements between large IT companies and resellers.

3
New cards

NDA (Non-Disclosure Agreement)

A legal agreement protecting information assets; breaking it can lead to legal consequences.

4
New cards

SLA (Service Level Agreement)

A contractual agreement detailing the terms under which a service is provided.

5
New cards

MSA (Measurement Systems Analysis)

Evaluates data collection and statistical methods for effectiveness in quality management.

6
New cards

MOA (Memorandum of Agreement)

A formal, legally binding contract detailing rights and responsibilities of parties involved.

7
New cards

SOW (Statement of Work)

A document that defines security services, tasks, deliverables, and timelines for a client.

8
New cards

SIEM (Security Information and Event Management)

Combines management of security data inputs for reporting and alerting.

9
New cards

SOAR (Security Orchestration, Automation, and Response)

Automates and coordinates complex security tasks using playbooks and machine learning.

10
New cards

ST&E (Security Test and Evaluation)

Examination of protective measures placed on an operational network.

11
New cards

Network Scanners

Probes hosts for open ports and searches for known vulnerabilities.

12
New cards

Application Scanners

Access source code to test applications from within, without running them.

13
New cards

Web Application Scanners

Identifies vulnerabilities specifically in web applications.

14
New cards

Password Cracking

Software used to test and detect weak passwords needing changes.

15
New cards

Log Review

The practice of examining security logs to identify potential threats.

16
New cards

Integrity Checkers

Systems that detect and report changes in the system's integrity.

17
New cards

Virus Detection

Software that identifies and removes computer viruses and malware.

18
New cards

ipconfig

Command that displays TCP/IP settings, including IP address and DNS information.

19
New cards

Arp

Maps known MAC addresses to their associated IP addresses.

20
New cards

Ping

Tests network connectivity by sending ICMP requests to a host.

21
New cards

Pathping

Combines ping and tracert to determine latency and packet loss.

22
New cards

Tracert

Traces the route packets take to a destination, recording each hop.

23
New cards

Nslookup

Queries a DNS server to help troubleshoot DNS issues.

24
New cards

Nbtstat

Helps troubleshoot NetBIOS name resolution problems in Windows.

25
New cards

nmap

Used for security auditing, locating hosts, and detecting operating systems.

26
New cards

Netcat

Gather information from TCP/UDP connections for various network tasks.

27
New cards

Hping

Assembles and analyzes packets for port scanning and firewall testing.

28
New cards

Zenmap

Used to discover computers and services on a network, creating a map.

29
New cards

Tripwire

Tool that validates IT configurations against security standards.

30
New cards

Nessus

Vulnerability scanning software focusing on remote access configurations.

31
New cards

L0phtCrack

A password auditing and recovery application.

32
New cards

Metasploit

Provides information on vulnerabilities for penetration testing.

33
New cards

theHarvester

Tool for gathering open-source intelligence on a specific domain.

34
New cards

Dnsenum

Packages numerous tests in a single query for DNS hosting information.

35
New cards

Scanless

Uses third-party sites to scan for open ports and services defensively.

36
New cards

Curl

Command-line client for performing data transfers over various protocols.

37
New cards

CVE (Common Vulnerabilities and Exposure)

Dictionary of vulnerabilities in published operating systems and applications.

38
New cards

CVSS (Common Vulnerability Scoring System)

Generates a score based on vulnerability characteristics, ranked from 0-10.

39
New cards

False Positives

Scanned vulnerabilities incorrectly flagged as risks that are not actually vulnerable.

40
New cards

False Negatives

Potential vulnerabilities that are missed during scans.

41
New cards

Active Reconnaissance Tools

Directly interact with network systems to gather information.

42
New cards

Passive Reconnaissance Tools

Learn about networks indirectly through information sources.

43
New cards

Examples of Active Reconnaissance Tools

Tools such as Nmap, Metasploit, Superscan, Traceroute, and Pathping used to probe systems.