All Sec+ Words

5.0(1)
studied byStudied by 16 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/335

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:54 PM on 3/4/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

336 Terms

1
New cards

cellular telephony

A communications network in which the coverage area is divided into hexagon-shaped cells

2
New cards

infrared

Light that is next to visible light on the light spectrum and was once used for data communications.

3
New cards

Universal Serial Bus (USB) connectors

A port on mobile devices used for data transfer.

4
New cards

Bring your own device (BYOD)

Allows users to use their own personal mobile devices for business purposes.

5
New cards

Corporate owned, personally enabled (COPE)

Employees choose from a selection of company-approved devices.

6
New cards

Choose your own device (CYOD)

Employees choose from a limited selection of approved devices but pay the upfront cost of the device while the business owns the contract.

7
New cards

Virtual desktop infrastructure (VDI)

Stores sensitive applications and data on a remote server that is accessed through a smartphone.

8
New cards

Corporate owned

A mobile device that is purchased and owned by the enterprise.

9
New cards

firmware over-the-air (OTA) updates

Mobile operating system patches and updates that are distributed as an over-the-air (OTA) update.

10
New cards

Global Positioning System (GPS)

A satellite based navigation system that provides information to a GPS receiver anywhere on (or near) the Earth where there is an unobstructed line of sight to four or more GPS satellites.

11
New cards

geolocation

The process of identifying the geographical location of a device.

12
New cards

GPS tagging (Geo tagging)

Adding geographical identification data to media such as digital photos taken on a mobile device

13
New cards

tethering

Using a mobile device with an active Internet connection to share that connection with other mobile devices through Bluetooth or Wi-Fi.

14
New cards

USB On-the-Go (OTG)

A specification that allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access.

15
New cards

external media access

A device with a USB connection that can function as a host (to which other devices may be connected such as a USB flash drive) to access media.

16
New cards

malicious flash drive

A USB flash drive infected with malware.

17
New cards

Malicious USB cable

A USB cable embedded with a Wi-Fi controller that can receive commands from a nearby device to send malicious commands to the connected mobile device.

18
New cards

Hotspot

A location where users can access the Internet with a wireless signal.

19
New cards

jailbreaking

Circumventing the installed built-in limitations on Apple iOS devices.

20
New cards

Rooting

Circumventing the installed built-in limitations on Android devices.

21
New cards

third party app store

A site from which unofficial apps can be downloaded.

22
New cards

sideloading

Downloading unofficial apps, typically through jailbreaking/rooting

23
New cards

custom firmware

Firmware that is written by users to run on their own mobile devices.

24
New cards

carrier unlocking

Uncoupling a phone from a specific wireless provider.

25
New cards

short message service (SMS)

Text messages of a maximum of 160 characters.

26
New cards

multimedia messaging service (MMS)

Text messages in which pictures, video, or audio can be included.

27
New cards

rich communication services (RCS)

Mobile device communication which can convert a texting app into a live chat platform and supports pictures, videos, location, stickers, and emojis.

28
New cards

personal identification number (PIN)

A passcode made up of numbers only.

29
New cards

screen lock

A security setting that prevents a mobile device from being accessed until the user enters the correct passcode permitting access.

30
New cards

context aware authentication

Using a contextual setting to validate a user.

31
New cards

full disk encryption

The encryption of all user data on a mobile device.

32
New cards

storage segmentation

Separating business data from personal data on a mobile device.

33
New cards

containerization

Separating storage into separate business and personal "containers."

34
New cards

remote wipe

A technology used to erase sensitive data stored on the mobile device.

35
New cards

mobile device management (MDM)

Tools that allow a mobile device to be managed remotely by an organization.

36
New cards

geofencing

Using the mobile device's GPS to define geographical boundaries where an app can be used.

37
New cards

push notification services

Sending SMS text messages to selected users or groups of users.

38
New cards

mobile application management (MAM)

Tools that are used for distributing and controlling access to apps on mobile devices.

39
New cards

Content Management

Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.

40
New cards

mobile content management (MCM)

A system provides content management to mobile devices used by employees in an enterprise.

41
New cards

unified endpoint management (UEM)

A group or class of software tools has a single management interface for mobile devices as well as computer devices.

42
New cards

embedded system

Computer hardware and software contained within a larger system that is designed for a specific function.

43
New cards

raspberry Pi (types of embedded devices)

A low-cost credit-card-sized computer motherboard.

44
New cards

arduino

A controller for other devices.
- has an eight-bit microcontroller instead of a 64-bit microprocessor on the Raspberry Pi

- a limited amount of RAM, and no operating system

45
New cards

field-programmable gate array (FPGA)

A hardware integrated circuit (IC) that can be programmed by the user to carry out one or more logical operations

46
New cards

system on a chip (SoC)

A single microprocessor chip on which all the necessary hardware components are contained.

47
New cards

real-time operating system (RTOS)

An operating system that is specifically designed for an SoC in an embedded system.

48
New cards

smart meters

Digital meters that measure the amount of utilities consumed.

49
New cards

Industrial control systems (ICSs)

Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines

50
New cards

supervisory control and data acquisition (SCADA) system

A system that controls multiple industrial control systems (ICS).

51
New cards

heating, ventilation, and air conditioning (HVAC) (specialized systems)

Environmental systems that provide and regulate heating and cooling.

52
New cards

multifunctional printer (MFP)

A device that combines the functions of a printer, copier, scanner, and fax machine.

53
New cards

voice over IP (VoIP)

A technology that uses a data-based IP network to add digital voice clients and new voice applications onto the IP network.

54
New cards

Internet of Things (IoT)

Connecting any device to the Internet for the purpose of sending, receiving, and using data

55
New cards

constraints

Limitations that make security a challenge for embedded systems and specialized devices.

56
New cards

Geographical considerations

in context based firewall rules, determines rules depending on the geographical location of the device

57
New cards

Content/url filtering

assesses web pages based on content then puts them on white list or black list

58
New cards

Stateless packet filtering

examines packet only by the firewall rules

59
New cards

Stateful packet filtering

examines packet by firewall rules and if internal device requested it b/c packet may be unsolicited

60
New cards

Open source firewall

firewall that is freely available, built on secure foundations

61
New cards

Proprietary firewalls

firewall that is owned by a separate entity

62
New cards

Hardware firewall

specialized hardware device for firewall purposes. Has more features, more secure but more expensive

63
New cards

Software firewall

a firewall that is installed into a device. can become compromised if host is also compromised

64
New cards

Host-based

software firewall, only protects host that it is installed on 

65
New cards

Virtual firewall

for cloud based environments where appliance firewalls are impractical

66
New cards

Web application firewall (WAF)

either hardware or software, examines web applications using HTTP. Blocks sites and attacks such as SQL injections and XSS

67
New cards

Network address translation gateway

a NAT for the cloud

68
New cards

Next generation firewall (NGFW)

can filter packets based on application and uses deep packet inspection to examine payloads to see if they are carrying malware. 

69
New cards

Unified threat management (UTM)

combines several security functions into one

70
New cards

Forward proxy

proxy that gives the user anonymity by caching previous web requests and forwarding them to the user or forwarding the users request to the external server

71
New cards

Reverse proxy

proxy that gives the internal server anonymity by forwarding external requests to the internal device

72
New cards

Honeypots

a computer used to deflect an attacker’s attention away from a legitimately vulnerable device and to discover their security tactics.

73
New cards

Honeyfiles

not valuable files that are meant to attract attackers

74
New cards

Fake telemetry

fake version of telemetry (data on how software in managed in a company). Used to lure attackers in.

75
New cards

Honeynet

network with vulnerabilities setup with the same intentions of a honeypot

76
New cards

DNS sinkholes

when a DNS server purposefully gives the user a false IP address in order to redirect them to a “sinkhole” which assists network administrators in finding infected users

77
New cards

IDS vs IPS

IDS (Intrusion detection system) detects attacks as it happens while an IPS (Intrusion protection system) attempts to block the attack.

78
New cards

Inline IPS/IDS system

IPS/IDS system that is connected to the network and monitors traffic as it happens

79
New cards

Passive (IDS/IPS) system

connected to port on switch, receives copy of network traffic

80
New cards

Out-of-band management

connecting through a separate management interface (physical connection, console router for enterprise and multiple devices) to access an otherwise inaccessible (off, sleep mode, etc) device (usually IDS systems).

81
New cards

Anomaly monitoring

a form of IPS/IDS monitoring that includes establishing a “baseline” of regular behavior on the network to then compare on-going behavior with that baseline to detect anomalies in security. Results in several false positives and attacks can happen before a baseline is established.

82
New cards

Signature-based monitoring

a form of monitoring that recognizes a pattern in an attack (traffic, activity, or transactions) and uses a database of these patterns (signatures) to detect incoming malware. Similar to anti-virus.

83
New cards

Behavioral monitoring

a form of IPS/IDS monitoring that analyzes the behaviors of programs and processes and alerts the user when something is abnormal

84
New cards

Heuristic monitoring

a form of IPS/IDS monitoring that follows the philosophy of: Will this be harmful if it is allowed to execute? Heuristic means to find/discover. Algorithm is figuring out if the application should be executed.

85
New cards

Network Intrusion Detection System (NIDS)

detects network intrusions

86
New cards

Network Intrusion Prevention System (NIPS)

system that prevents network intrusions

87
New cards

Network hardware security module

if a company has many HSMs they can use this in the form of a trusted network computer that can encrypt, exchange keys, and generate random numbers.

88
New cards

Baseline configuration

a set of configuration settings that are regarded as the standard for all devices. It is the starting point of configuration and the bare minimum.

89
New cards

Standard naming conventions

Establishing a standard for the way devices should be named. Avoids confusion.

90
New cards

Internet protocol schema

standard for setting up IP addresses. Avoids confusion, waste of space, and helps when troubleshooting

91
New cards

Diagram

mapping network devices can help with troubleshooting and when a new device is connected

92
New cards

Access Control List

rules that either grant or deny access to certain assets. Network ACLs are the most common. Prevents IP spoofing.

93
New cards

Virtual Private Network (VPN)

allowing users to access the public network (the Internet) as if it were a private network. Does this by encrypting the tunnel of communciation

94
New cards

remote access VPN

User-to-LAN connection for remote users

95
New cards

site-to-site VPN

VPN connection setup between multiple networks. Ex: central office, branch1, branch2 etc.

96
New cards

always-on VPNs

users always stay connected to VPN

97
New cards

full tunnel

a form of VPN tunneling where all traffic is sent to the VPN concentrator where it is protected.

98
New cards

split-tunnel

traffic is “split” vulnerable and non-vulnerable. Vulnerable is sent to VPN concentrator.

99
New cards

Layer 2 Tunneling Protocol (L2TP)

VPN protcol that does not have encryption by default, so paired with IPsec

100
New cards

HTML 5

can be used as “clientless” VPN so no other software needs to be installed

Explore top flashcards