GCS 1-4: Foundations-Tools

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

flashcard set

Earn XP

Description and Tags

Course 1 (Foundations of Cybersecurity), Module 4 (Tools & Programming Languages)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

34 Terms

1
New cards

Log

A record of events that occur within an organization’s systems.

2
New cards

Security Information and Event Management

Aka SIEM. An application that collects and analyzes log data to monitor critical activities in an organization.

3
New cards

Splunk and Chronicle

Commonly used SIEM tools.

4
New cards

Splunk

A data analysis platform.

5
New cards

Splunk Enterprise

Provides SIEM solutions. It is a self-hosted tool used to retain, analyze, and search an organization’s log data.

6
New cards

Google Chronicle

A cloud-native SIEM tool that stores security data for search and analysis.

7
New cards

Cloud-native

Allows for fast delivery of new features.

8
New cards

Playbook

A manual that provides details about an operational action.

9
New cards

Network Protocol Analyzer

Aka packet sniffer. A tool designed to capture and analyze data traffic within a network.

10
New cards

Forensic Case Playbooks

Chain of custody and protecting and preserving evidence playbooks.

11
New cards

Chain of Custody Playbook

The process of documenting evidence possession and control during an incident lifecycle. As a security analyst involved in a forensic analysis, you will work with the computer data that was breached. You and the forensic team will also need to document who, what, where, and why you have the collected evidence. The evidence is your responsibility while it is in your possession. Evidence must be kept safe and tracked. Every time evidence is moved, it should be reported. This allows all parties involved to know exactly where the evidence is at all times.

12
New cards

Protecting and Preserving Evidence Playbook

The process of properly working with fragile and volatile digital evidence. As a security analyst, understanding what fragile and volatile digital evidence is, along with why there is a procedure, is critical. As you follow this playbook, you will consult the order of volatility. While conducting an investigation, improper management of digital evidence can compromise and alter that evidence. When evidence is improperly managed during an investigation, it can no longer be used. For this reason, the first priority in any investigation is to properly preserve the data. You can preserve the data by making copies and conducting your investigation using those copies.

13
New cards

Order of Volatility

A sequence outlining the order of data that must be preserved from first to last. It prioritizes volatile data, which is data that may be lost if the device in question powers off, regardless of the reason. 

14
New cards

Programming

Used to create a specific set of instructions for a computer to execute tasks.

15
New cards

Linux

An open-source operating system.

16
New cards

Structured Query Language

Aka SQL. A programming language used to create, interact with, and request information from a database.

17
New cards

Database

An organized collection of information or data.

18
New cards

Python

Used to perform tasks that are repetitive and time-consuming, and that require a high level of detail and accuracy.

19
New cards

Automation

The use of technology to reduce human and manual effort in performing common and repetitive tasks. It also helps reduce the risk of human error.

20
New cards

Data point

A specific piece of information.

21
New cards

Operating system

The interface between computer hardware and the user. Linux, macOS, and Windows are examples. They each offer different functionality and user experiences.

22
New cards

Open source

The code is available to the public and allows people to make contributions to improve the software.

23
New cards

Command

An instruction telling the computer to do something.

24
New cards

Command-line interface

Text-based user interface that uses commands to interact with the computer.

25
New cards

Web vulnerability

A unique flaw in a web application that a threat actor could exploit by using malicious code or behavior, to allow unauthorized access, data theft, and malware deployment.

26
New cards

Antivirus software

Aka anti-malware. A software program used to prevent, detect, and eliminate malware and viruses. Depending on the type, it can scan the memory of a device to find patterns that indicate the presence of malware.

27
New cards

Intrusion Detection System

Aka IDS. An application that monitors system activity and alerts on possible intrusions. The system scans and analyzes network packets, which carry small amounts of data through a network. The small amount of data makes the detection process easier for an IDS to identify potential threats to sensitive data. Other occurrences an IDS might detect can include theft and unauthorized access.

28
New cards

Encryption

Makes data unreadable and difficult to decode for an unauthorized user; its main goal is to ensure confidentiality of private data. It is the process of converting data from a readable format to a cryptographically encoded format.

29
New cards

Cryptographic encoding

Converting plaintext into secure ciphertext.

30
New cards

Plaintext

Unencrypted information.

31
New cards

Secure ciphertext

The result of encryption.

32
New cards

Encoding

Uses a public conversion algorithm to enable systems that use different data representations to share information.

33
New cards

Penetration testing

Aka pen testing. The act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. It is a thorough risk assessment that can evaluate and identify external and internal threats as well as weaknesses.

34
New cards

Portfolio Projects

  • Drafting a professional statement

  • Conducting a security audit

  • Analyzing network structure and security

  • Using Linux commands to manage file permissions

  • Applying filters to SQL queries

  • Identifying vulnerabilities for a small business

  • Documenting incidents with an incident handler’s journal

  • Importing and parsing a text file in a security-related scenario

  • Creating or revising a resume