1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Data at rest
On computer storage
Data in transit
Traveling along cables or broadcasting wirelessly
Risk
Potential for loss or damage
Vulnerability
A defect that creates an exploitable condition, making the system vulnerable to attacks
Exploit
Code that takes advantage of a vulnerability in a system or software to gain unauthorized access
Threat
Potential danger that can harm your systems, data, or operations
Least privilege
Only granting the minimum access necessary to perform actions
Honeypot/honeynet
Individual/connected devices inviting attacks to capture information
IAM
Identity and access management
MFA
Multifactor authentication
SSO
Single sign-on
PKI
Public Key Infrastructure
SAML
Security Assertion Markup Language
CIA
Confidentiality, Integrity, and Availability
RADIUS
For authentication, authorization, and accounting
TACACS+
Terminal Access Controller Access Control System Plus
ICS
Industrial Control System
BYOD
Bring Your Own Device
SCADA
Supervisory control and data acquisition
OT
Operational technology
GDPR
General Data Protection Regulation
PCI DSS
Payment Card Industry Data Security Standard
IoT
Internet of Things
IIoT
Industrial Internet of Things
VLAN hopping
Attacker can move from one VLAN to another
Media Access Control (MAC) flooding
Displacing legitimate MAC entries, forcing data into broadcast mode
Address Resolution Protocol (ARP) poisoning/spoofing
Forged ARP messages to redirect traffic from the victim
DoS
Denial-of-service
DDoS
Distributed denial-of-service
DNS poisoning
Exploit known DNS vulnerabilities
DNS spoofing
Forged DNS data to redirect traffic to hacker
Evil twin
Fake Wi-Fi access point to trick people into choosing it over the genuine one
On-path attack/Man-in-the-middle (MITM) attack
Intercept a two-party conversation for one’s advantage and some tools include: ettercap, wireshark, tcpdump
Phishing
Attack by email; single target
Dumpster diving
Recover information from trash
Shoulder surfing
Look over someone’s shoulder, often with a recording device
Tailgating
Unauthorized entity follows authorized party into secured premises
Device hardening
Reducing the attack surface to secure a device
802.1X
For port-based network access control (PNAC)
MAC filtering
Control network access by device MAC
NAC
Network access control
ACL
Access control list
Uniform Resource Locator (URL) filtering
Allow/block website access by URL
Screened subnet (demilitarized zone, DMZ)
Five components: external network, external router, perimeter network, internal router, internal network