Cisco Cybersecurity Essentials Terms (Original by jm1048474)

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/168

flashcard set

Earn XP

Description and Tags

Don't credit me. All credits go to jm1048474 (https://quizlet.com/725902679/cisco-cybersecurity-essentials-terms-flash-cards/)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

169 Terms

1
New cards

GIS

Geospatial Information Systems

<p>Geospatial Information Systems</p>
2
New cards

IoT

Internet of Things

<p>Internet of Things</p>
3
New cards

CVE

Common Vulnerabilities and Exposures (CVE). A dictionary of publicly known security vulnerabilities and exposures.

<p>Common Vulnerabilities and Exposures (CVE). A dictionary of publicly known security vulnerabilities and exposures.</p>
4
New cards

What is a program that enables wide spread sharing of cyber intellegence?

InfraGard

<p>InfraGard</p>
5
New cards

What is an example of early warning systems that can be used to thwart cybercriminals?

Honeynet Project

<p>Honeynet Project</p>
6
New cards

ISO/IEC 27000

An example of Information Security Management Standards.

The standards provide a framework for implementing cybersecurity measures within an organization.

<p>An example of Information Security Management Standards.</p><p>The standards provide a framework for implementing cybersecurity measures within an organization.</p>
7
New cards

EHR

Electronic Health Records

<p>Electronic Health Records</p>
8
New cards

DNS

Domain Name Service

<p>Domain Name Service</p>
9
New cards

Packet Forgery or Packet injection

Interferes with an established network communication by constructing packets to appear as if they are apart of a communication.

<p>Interferes with an established network communication by constructing packets to appear as if they are apart of a communication.</p>
10
New cards

MitM

Man in the middle. A MITM attack is a form of active interception allowing an attacker to intercept traffic and insert malicious code sent to other clients. Kerberos provides mutual authentication and helps prevent MITM attacks.

This attack is enabled by Packet Forgery

<p>Man in the middle. A MITM attack is a form of active interception allowing an attacker to intercept traffic and insert malicious code sent to other clients. Kerberos provides mutual authentication and helps prevent MITM attacks.</p><p>This attack is enabled by Packet Forgery</p>
11
New cards

SCADA

Supervisory control and data acquisition. Typically industrial control systems within large facilities such as power plants or water treatment facilities. SCADA systems are often contained within isolated networks that do not have access to the Internet, but are still protected with redundant and diverse security controls. SCADA systems can be protected with NIPS systems and VLANs.

<p>Supervisory control and data acquisition. Typically industrial control systems within large facilities such as power plants or water treatment facilities. SCADA systems are often contained within isolated networks that do not have access to the Internet, but are still protected with redundant and diverse security controls. SCADA systems can be protected with NIPS systems and VLANs.</p>
12
New cards

NSA

National Security Agency

Protect US national security systems and produce foreign signals intelligence information

<p>National Security Agency</p><p>Protect US national security systems and produce foreign signals intelligence information</p>
13
New cards

BYOD

Bring your own device. A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies and organizations often use VLANs to isolate mobile devices.

<p>Bring your own device. A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies and organizations often use VLANs to isolate mobile devices.</p>
14
New cards

Big Data

A broad term for datasets so large or complex that traditional data processing applications are inadequate.

<p>A broad term for datasets so large or complex that traditional data processing applications are inadequate.</p>
15
New cards

APT

Advanced Persistent Threat: Is a continuous computer hack that occurs under the radar against a specific object.

<p>Advanced Persistent Threat: Is a continuous computer hack that occurs under the radar against a specific object.</p>
16
New cards

Federated Identity Management

An arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group.

17
New cards

TDoS

Telephone Denial of Service

<p>Telephone Denial of Service</p>
18
New cards

VoIP

Voice over Internet protocol: A phone connection through a personal computer with any type of broadband Internet connection.

<p>Voice over Internet protocol: A phone connection through a personal computer with any type of broadband Internet connection.</p>
19
New cards

DDoS

Distributed Denial of Service

<p>Distributed Denial of Service</p>
20
New cards

NIST

National Institute of Standards and Technology.

NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL).

<p>National Institute of Standards and Technology.</p><p>NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL).</p>
21
New cards

National Cybersecurity Workforce Framework

1. Operate and Maintain

2. Protect and Defend

3. Investigate

4. Collect and Operate

5. Analyze

6. Oversight and Development

7. Securely Provision

<p>1. Operate and Maintain</p><p>2. Protect and Defend</p><p>3. Investigate</p><p>4. Collect and Operate</p><p>5. Analyze</p><p>6. Oversight and Development</p><p>7. Securely Provision</p>
22
New cards

The States of Data

- Data In-Transit

- Data At-Rest

- Data In-Use

<p>- Data In-Transit</p><p>- Data At-Rest</p><p>- Data In-Use</p>
23
New cards

Cybersecurity Countermeasures

- Technology

- Policies and Practices

- People

<p>- Technology</p><p>- Policies and Practices</p><p>- People</p>
24
New cards

AAA

Authentication, Authorization, and Accounting

<p>Authentication, Authorization, and Accounting</p>
25
New cards

Ensuring Availability [7]

1. Equipment maintenance

2. OS and system updates

3. Backup testing

4. Disaster planning

5. New technology implementations

6. Unusual activity monitoring

7. Availability testing

26
New cards

RAID

Redundant Array of Independent Disks:

A group of two or more integrated hard disks, which spread information evenly between all involved hard drives; making information transfer much quicker.

<p>Redundant Array of Independent Disks:</p><p>A group of two or more integrated hard disks, which spread information evenly between all involved hard drives; making information transfer much quicker.</p>
27
New cards

SAN

Storage Area Network. A specialized network of high-speed storage devices.

<p>Storage Area Network. A specialized network of high-speed storage devices.</p>
28
New cards

NAS

Network Attached Storage - A Specialized file server that is designed and dedicated to support only data storage needs.

<p>Network Attached Storage - A Specialized file server that is designed and dedicated to support only data storage needs.</p>
29
New cards

IDS

Intrusion detection system.

A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns.

<p>Intrusion detection system.</p><p>A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns.</p>
30
New cards

IPS

Intrusion prevention system.

A preventative control that will stop an attack in progress. It is similar to an active IDS except that it's placed in line with traffic.

<p>Intrusion prevention system.</p><p>A preventative control that will stop an attack in progress. It is similar to an active IDS except that it's placed in line with traffic.</p>
31
New cards

VPN

Virtual private network.

Provides access to a private network over a public network such as the Internet. VPN concentrators provide VPN access to large groups of users.

<p>Virtual private network.</p><p>Provides access to a private network over a public network such as the Internet. VPN concentrators provide VPN access to large groups of users.</p>
32
New cards

NAC

Network access control.

Inspects clients for health and can restrict network access to unhealthy clients to a remediation network. Clients run agents and these agents report status to a NAC server. NAC is used for VPN and internal clients. MAC filtering is a form of NAC.

<p>Network access control.</p><p>Inspects clients for health and can restrict network access to unhealthy clients to a remediation network. Clients run agents and these agents report status to a NAC server. NAC is used for VPN and internal clients. MAC filtering is a form of NAC.</p>
33
New cards

SaaS

Software as a Service

<p>Software as a Service</p>
34
New cards

IaaS

Infrastructure as a Service

<p>Infrastructure as a Service</p>
35
New cards

PaaS

Platform as a Service

<p>Platform as a Service</p>
36
New cards

ISO 27000 - Twelve Domains of Cybersecurity (pt.1) [6]

1. Risk Assessment

2. Security Policy

3. Asset Management

4. Human Resources Security

5. Physical and Environmental Security

6. Communications and Operations Management

37
New cards

ISO 27000 - Twelve Domains of Cybersecurity (pt.2) [6]

7. Information Systems Acquisition and Maintenance

8. Access Control

9. Information Security Incident Management

10. Business Continuity Management

11. Organization of Information Security

12. Compliance

38
New cards

Malware

Software that is intended to damage or disable computers and computer systems.

<p>Software that is intended to damage or disable computers and computer systems.</p>
39
New cards

Worms

Worms are malicious code that replicates by independently exploiting vulnerabilities in networks.

(It spreads through networks.)

<p>Worms are malicious code that replicates by independently exploiting vulnerabilities in networks.</p><p>(It spreads through networks.)</p>
40
New cards

Virus

Viruses are malicious executable code attached to another executable file. This file could be a legitimate program.

<p>Viruses are malicious executable code attached to another executable file. This file could be a legitimate program.</p>
41
New cards

Trojan Horse

A trojan horse is malware that carries out malicious operations under the guise of a desired operation.

<p>A trojan horse is malware that carries out malicious operations under the guise of a desired operation.</p>
42
New cards

Logic Bomb

A malicious program that uses a trigger to awaken the malicious code. Triggers can be dates, times, other programs running, or the deletion of a user account.

<p>A malicious program that uses a trigger to awaken the malicious code. Triggers can be dates, times, other programs running, or the deletion of a user account.</p>
43
New cards

Backdoor

Software code that gives access to a program or a service that circumvents normal security protections.

<p>Software code that gives access to a program or a service that circumvents normal security protections.</p>
44
New cards

Rootkit

Program that hides in a computer and allows someone from a remote location to take full control of the computer

<p>Program that hides in a computer and allows someone from a remote location to take full control of the computer</p>
45
New cards

Defending Against Malware [2]

1. Antivirus Program

2. Up-to-Date Software

<p>1. Antivirus Program</p><p>2. Up-to-Date Software</p>
46
New cards

SEO Poisoning

Increases traffic to malicious websites, force malicious sites to rank higher. (Search Engine Optimization)

<p>Increases traffic to malicious websites, force malicious sites to rank higher. (Search Engine Optimization)</p>
47
New cards

Social Engineering

Hackers use their social skills to trick people into revealing access credentials or other valuable information.

<p>Hackers use their social skills to trick people into revealing access credentials or other valuable information.</p>
48
New cards

Social Engineering Tactics [7]

1. Authority

2. Intimidation

3. Consensus/Social Proof

4. Scarcity

5. Urgency

6. Familiarity/Liking

7. Trust

<p>1. Authority</p><p>2. Intimidation</p><p>3. Consensus/Social Proof</p><p>4. Scarcity</p><p>5. Urgency</p><p>6. Familiarity/Liking</p><p>7. Trust</p>
49
New cards

Vishing, Smishing, Pharming

1. Vishing is phishing using voice communication.

2. Smishing is text messaging phishing.

3. Pharming is the impersonation of a legit website, so that a user might input their credentials.

<p>1. Vishing is phishing using voice communication.</p><p>2. Smishing is text messaging phishing.</p><p>3. Pharming is the impersonation of a legit website, so that a user might input their credentials.</p>
50
New cards

Dos/DDos

Denial of Service, Distributed Denial of Service

Denial of Service is just from one computer. While Distributed Denial of Service is from multiple by means of virus spread.

<p>Denial of Service, Distributed Denial of Service</p><p>Denial of Service is just from one computer. While Distributed Denial of Service is from multiple by means of virus spread.</p>
51
New cards

Sniffing

Capturing and recording network traffic.

Example program would be WireShark

<p>Capturing and recording network traffic.</p><p>Example program would be WireShark</p>
52
New cards

Spoofing

When someone pretends to be someone else with the intent of obtaining unauthorized data.

Mac Address Spoofing is when one computer takes on the identity of another known computing devices.

<p>When someone pretends to be someone else with the intent of obtaining unauthorized data.</p><p>Mac Address Spoofing is when one computer takes on the identity of another known computing devices.</p>
53
New cards

IP Spoofing

Occurs when an intruder uses another site's IP address to masquerade as that other site

<p>Occurs when an intruder uses another site's IP address to masquerade as that other site</p>
54
New cards

ARP

Address Resolution Protocol.

Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates.

<p>Address Resolution Protocol.</p><p>Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates.</p>
55
New cards

DNS Spoofing

Unauthorized changes to the DNS to reroute a specific domain name to a different IP address controlled by the criminal.

56
New cards

Zero-Day Attack

Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.

<p>Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.</p>
57
New cards

Grayware

Refers to a malicious software or code that is considered to fall in the "grey area" between normal software and a virus.

<p>Refers to a malicious software or code that is considered to fall in the "grey area" between normal software and a virus.</p>
58
New cards

Rouge Access Point

A wireless access point that gives unauthorized access to secure networks.

Evil twin attack uses the criminal's access point improved with higher connectivity to trick users to connect to the compromised network.

<p>A wireless access point that gives unauthorized access to secure networks.</p><p>Evil twin attack uses the criminal's access point improved with higher connectivity to trick users to connect to the compromised network.</p>
59
New cards

RF Jamming

Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.

<p>Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.</p>
60
New cards

Bluejacking / Bluesnarfing

Bluejacking refers to sending someone an unsolicited message or picture using a Bluetooth connection.

Bluesnarfing refers to hijacking a Bluetooth device using some software exploit.

<p>Bluejacking refers to sending someone an unsolicited message or picture using a Bluetooth connection.</p><p>Bluesnarfing refers to hijacking a Bluetooth device using some software exploit.</p>
61
New cards

WEP

Wired Equivalent Privacy - Outdated form of wireless security, where each user shares the same key.

The key is also unencrypted while going through traffic, which means a hacker using Wireshark can see vital info in plain text.

<p>Wired Equivalent Privacy - Outdated form of wireless security, where each user shares the same key.</p><p>The key is also unencrypted while going through traffic, which means a hacker using Wireshark can see vital info in plain text.</p>
62
New cards

XSS

Cross-Site Scripting - Running a script routine on a user's machine from a website without their permission

<p>Cross-Site Scripting - Running a script routine on a user's machine from a website without their permission</p>
63
New cards

XML Injection

Attack method where malicious XML is passed as input to exploit a vulnerability in the target app.

This attack can corrupt data.

<p>Attack method where malicious XML is passed as input to exploit a vulnerability in the target app.</p><p>This attack can corrupt data.</p>
64
New cards

SQL Injection

An attack that targets SQL servers by injecting commands to be manipulated by the database.

<p>An attack that targets SQL servers by injecting commands to be manipulated by the database.</p>
65
New cards

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory

<p>A technique for crashing by sending too much data to the buffer in a computer's memory</p>
66
New cards

Remote Code Executions

Application or web attack that establishes distant access to a program, service or device.

<p>Application or web attack that establishes distant access to a program, service or device.</p>
67
New cards

ActiveX

A set of technologies developed by Microsoft that specifies how applications should share information.

<p>A set of technologies developed by Microsoft that specifies how applications should share information.</p>
68
New cards

Cryptography

The art of writing or solving codes.

<p>The art of writing or solving codes.</p>
69
New cards

Symmetric encryption

An encryption method whereby the same key is used to encode and to decode the message

<p>An encryption method whereby the same key is used to encode and to decode the message</p>
70
New cards

Asymmetric Encryption

Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

<p>Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.</p>
71
New cards

Block Ciphers

Blocks ciphers perform encryption by breaking a message into fixed-length units, called blocks.

Block ciphers employ both confusion and diffusion.

Block ciphers often use different modes: ECB, CBC, CFB, and CTR.

<p>Blocks ciphers perform encryption by breaking a message into fixed-length units, called blocks.</p><p>Block ciphers employ both confusion and diffusion.</p><p>Block ciphers often use different modes: ECB, CBC, CFB, and CTR.</p>
72
New cards

Stream Ciphers

Ciphers that operate on each character or bit of a message (or data stream) one character/bit at a time.

<p>Ciphers that operate on each character or bit of a message (or data stream) one character/bit at a time.</p>
73
New cards

3DES

Triple Digital Encryption Standard.

A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES.

<p>Triple Digital Encryption Standard.</p><p>A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES.</p>
74
New cards

IDEA

International Data Encryption Algorithm

Operates on 64 bit blocks and uses 128 bit keys. Is faster than DES; used in PGP and other software; no successful attacks

<p>International Data Encryption Algorithm</p><p>Operates on 64 bit blocks and uses 128 bit keys. Is faster than DES; used in PGP and other software; no successful attacks</p>
75
New cards

AES

Advanced Encryption Standard

Operates on 128 bit blocks and uses 128 to 256 bit keys.

Government uses AES to protect classified information.

<p>Advanced Encryption Standard</p><p>Operates on 128 bit blocks and uses 128 to 256 bit keys.</p><p>Government uses AES to protect classified information.</p>
76
New cards

RSA

Rivest, Shamir, & Adleman

Asymmetric algorithm that uses the product of two very large rime numbers with an equal length of between 100 and 200 digits.

Browsers use RSA to establish a secure connection.

<p>Rivest, Shamir, & Adleman</p><p>Asymmetric algorithm that uses the product of two very large rime numbers with an equal length of between 100 and 200 digits.</p><p>Browsers use RSA to establish a secure connection.</p>
77
New cards

Diffie-Hellman

Asymmetric algorithm Diffie-Hellman is an algorithm used to establish a shared secret between two parties.

It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES

<p>Asymmetric algorithm Diffie-Hellman is an algorithm used to establish a shared secret between two parties.</p><p>It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES</p>
78
New cards

ElGamal

Asymmetric algorithm used for both digital signatures and general encryption; based on Diffie-Hellman algorithms. It is also the basis for the U.S. government's Digital Signature Algorithm (DSA).

<p>Asymmetric algorithm used for both digital signatures and general encryption; based on Diffie-Hellman algorithms. It is also the basis for the U.S. government's Digital Signature Algorithm (DSA).</p>
79
New cards

ECC

Elliptic Curve Cryptography

Uses elliptic curves as part of the algorithm. In the U.S., the Nation Security Agency uses ECC for digital signature generation and key exchange.

<p>Elliptic Curve Cryptography</p><p>Uses elliptic curves as part of the algorithm. In the U.S., the Nation Security Agency uses ECC for digital signature generation and key exchange.</p>
80
New cards

Key Length

The size of a key, usually measured in bits or bytes, which a cryptographic algorithm used in ciphering or deciphering protected information.

81
New cards

Keyspace

The number of possibilities that a specific key length can generate.

82
New cards

IKE

Internet Key Exchange. Used with IPsec to create a secure channel over port 500 in a VPN tunnel.

<p>Internet Key Exchange. Used with IPsec to create a secure channel over port 500 in a VPN tunnel.</p>
83
New cards

SSL

An abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet

<p>An abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet</p>
84
New cards

PGP

Pretty Good Privacy. Commonly used to secure e-mail communications between two private individuals but is also used in companies.

85
New cards

Logical Access Controls (pt.1) [5]

1. Encryption

2. Smart Cards

3. Passwords

4. Biometrics

5. Access Control Lists

86
New cards

Logical Access Controls (pt.2) [5]

6. Protocols

<p>6. Protocols</p>
87
New cards

MAC

Mandatory access control.

An access control model that uses sensitivity labels assigned to objects (files and folders) and subjects (users). MAC restricts access based on a need to know.

88
New cards

DAC

Discretionary Access Control.

An access control model where all objects have owners and owners can modify permissions for the objects (files and folders)

89
New cards

RBAC

Role-based access control.

An access control model that uses roles to define access and it is often implemented with groups.

<p>Role-based access control.</p><p>An access control model that uses roles to define access and it is often implemented with groups.</p>
90
New cards

The 3 Authentication Methods

1. What you know.

2. Who you are.

3. What you have.

<p>1. What you know.</p><p>2. Who you are.</p><p>3. What you have.</p>
91
New cards

Types of Security Controls

Preventative, Detective, Recovery, Deterrent, Corrective, Compensative

92
New cards

Data Masking

Replacing sensitive information with a non-sensitive version.

<p>Replacing sensitive information with a non-sensitive version.</p>
93
New cards

Steganography

A field within cryptography; uses images to hide data.

<p>A field within cryptography; uses images to hide data.</p>
94
New cards

Obfuscation

The action of making something obscure, unclear, or unintelligible

95
New cards

Hashing

Ensures data integrity.

The receiving device computes a checksum and compares it to the checksum included with the file. If no match the message has been altered.

<p>Ensures data integrity.</p><p>The receiving device computes a checksum and compares it to the checksum included with the file. If no match the message has been altered.</p>
96
New cards

Modern Hashing Algorithms

Message Digest 5 (MD5) - A one way function that makes it easy to compute a hash from the given input data but makes it very difficult to compute input dat given only a hash value.

Secure Hash Algorithm (SHA) - The NIST developed SHA, the algorithm specified in the Secure Has Standard. (SHS)

97
New cards

Salting

Is a random string of characters, where it allows for an additional input to the password before hashing. So, if two passwords are the same they will look completely different when hashing.

<p>Is a random string of characters, where it allows for an additional input to the password before hashing. So, if two passwords are the same they will look completely different when hashing.</p>
98
New cards

Stores the pre-computed hashes of passwords in a password dictionary along with the corresponding password.

Lookup Table

<p>Lookup Table</p>
99
New cards

Sacrifices hash-cracking speed to make the lookup tables smaller.

Rainbow Table

<p>Rainbow Table</p>
100
New cards

Allows the cybercriminal to launch a dictionary or brute-force attack on many hashes without the pre-computed lookup table.

Reverse Lookup Table