terms i dont know

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

124 Terms

1
New cards

SIEM

security information event manager, collects and analyzes log data from across an organizations IT environment to manage security threats in real time

2
New cards

802.1x

provides a secure way to authenticate users and devices before granting them access to a network. uses a centralized authentication server, and this allows all users to use their corporate credentials during the login process.

3
New cards

EAP

a security framework that supports authentication methods such as certificates or passwords, often used in Wi-Fi via 802.1x standard. An authentication framework commonly associated with network access control

4
New cards

on-path

when an attacker intercepts communication between two parties to eavesdrop, steal data, or alter the conversation. Can redirect traffic, ARP poisoning. specifically has to do with certificates

5
New cards

DoS

Denial of service, prevents communication to a server and most likely provides a timeout error

6
New cards

Key Escrow

describes the storage and management of decryption keys by a third-party

7
New cards

segmentation

describes the separation of user data from company data

8
New cards

cold-site recovery

the most simplistic recovery site. consists of power, networking capability, and cooling. doesnt have hardware elements such as servers and storage

9
New cards

warm-site recovery

all the elements of a cold site + some, doesnt have data available

10
New cards

hot-site recovery

a fully functional backup site that has important data mirrored onto it

11
New cards

PSK

(Pre-Shared Key) is a wireless configuration option that allows everyone on the network to use the same access key or password when connecting to the wireless network.

12
New cards

WPA3

(Wi-Fi Protected Access 3) is an encryption protocol used on wireless networks. All data sent over a WPA3-protected wireless network will be encrypted.

13
New cards

Posture assessment

evaluates the configuration of a system to ensure all configurations and applications are up to date and secure as possible.

14
New cards

discretionary

an authorization method where the owner of the data determines the scope and type of access. If a user creates a spreadsheet, the user can then assign users and groups to have a particular level of access to that spreadsheet.

15
New cards

mandatory

uses a series of security levels (i.e., public, private, secret) and assigns those levels to each object in the operating system. Users are assigned a security level, and they would only have access to objects that meet or are below that assigned security level.

16
New cards

rule-based

determines access based on a series of system- enforced rules. An access rule might require a particular browser be used to complete a web page form, or access to a file or system is only allowed during certain times of the day.

17
New cards

role-based

assigns a user’s permissions based on their role in the organization. For example, a manager would have a different set of rights and permissions than a team lead.

18
New cards

deauthentication

attacks are commonly associated with wireless networks, and they usually cause disconnects and lack of connectivity

19
New cards

Buffer overflow

are associated with application attacks and can cause applications to crash or act in unexpected ways. can be manipulated to execute code on the remote device.

20
New cards

Dns poisoning

can modify a DNS server to modify the IP address provided during the name resolution process. If an attacker modifies the DNS information, they can direct client computers to any destination IP address.

21
New cards

SQL injection

takes advantage of poor input validation to circumvent the application and allows the attacker to query the database directly.

22
New cards

DNS filtering

uses a database of known malicious websites to resolve an incorrect or null IP address. If a user attempts to visit a known malicious site, the DNS resolution will fail and the user will not be able to visit the website.

23
New cards

honeynet

non-production network created to attract attackers.

24
New cards

SCADA

Supervisory Control and Data Acquisition

25
New cards

VLAN

Virtual Local Area Networks. segments a single physical network into multiple separate broadcast domains, grouping devices (like computers, servers) into virtual networks regardless of their physical location for better security,

26
New cards

Zero-day

attackers search for unknown vulnerabilities. They create exploits against these vulnerabilities. The vendor has no idea the vulnerability exists – They don’t have a fix for an unknown problem

27
New cards

NGFW

Next-Generation Firewall

28
New cards

key stretching

uses a cryptographic key multiple times for additional protection against brute force attacks.

29
New cards

SCAP

Security Content Automation Protocol

30
New cards

passive reconnaissance

gathering information about a target (person, organization, network) from public sources without directly interacting with them, making it stealthy and undetectable, like using Google, social media, or public records

31
New cards

DMARC

Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol. specifies the disposition of spam emails

32
New cards

SPF

Sender Policy Framework. an email authentication protocol that prevents spoofing and phishing by letting domain owners specify which mail servers are authorized to send emails for their domain

33
New cards

CA

Certificate Authority - An organization that issues and verifies digital certificates to confirm the identity of websites, users, or devices.

34
New cards

MTBF

Mean Time Between Failures is a reliability metric measuring the average time a repairable system operates between security incidents or failures

35
New cards

RTO

Recovery Time Objective is the maximum acceptable time an organization can tolerate a system or service being down after a cyberattack or disaster before significant business harm occurs

36
New cards

MTTR

Mean time to respond, measuring the average time it takes to fix a security issue

37
New cards

RPO

Recovery Point Objective. the maximum acceptable amount of data loss, measured in time (e.g., 1 hour, 1 day), that an organization can tolerate after a disruptive event like a cyberattack or system failure, dictating how frequently data backups must occur to meet business continuity needs

38
New cards

MOA

Memorandum of Agreement, a formal document between two or more organizations defining a cooperative relationship

39
New cards

SLA

Service Level Agreement. binding contract detailing specific service performance metrics, availability, and remedies for failure

40
New cards

SOW

Statement of Work. details specific projects, deliverables, timelines, and costs within that framework

41
New cards

Race Condition

a programming issue where a portion of the application is making changes not seen by other parts of the application. two different application processes are executing simultaneously.

42
New cards

Record Encryption

secures individual data entries (records) within a database or file, scrambling them into unreadable code (ciphertext) using unique keys

43
New cards

Journaling

logging system or application activities (like file changes, database updates, or emails) in a sequential record (a "journal") to ensure data integrity, enable recovery after crashes, and create audit trails for security analysis

44
New cards

MDM

Mobile Device Management, a solution that lets organizations remotely control, secure, and manage mobile devices

45
New cards

COPE

Corporate-Owned, Personally Enabled, a mobile device strategy where the company provides devices (phones, laptops) but allows employees limited personal use, balancing corporate security control

46
New cards

Configuration Enforcement

fixes the problems after a posture assessment

47
New cards

business continuity

define the procedures used when the primary business systems are unavailable.

48
New cards

development lifecycle

defines the specific policies associated with the design, development, testing, deployment, and maintenance of the application development process.

49
New cards

acceptable use policy

formally defines the proper use of company assets and technology devices.

50
New cards

risk register

identifies and documents the risks associated with each step of a project plan

51
New cards

risk transfer

Some organizations will transfer their risk to a third-party. For example, many organizations will purchase cybersecurity insurance to minimize the financial impact of a cybersecurity event.

52
New cards

backout plan

provides information on reverting to the previous configuration if an unrecoverable error is found during the change.

53
New cards

replay attack

captures information and then replays that information as the method of attack

54
New cards

privilege escalation attack

allows a user to exceed their normal rights and permissions.

55
New cards

jailbreaking

replaces the firmware on a mobile device to gain access to features not normally available in the operating system.

56
New cards

capacity planning

used to determine how many resources would be required for a particular task

57
New cards

load balancing

used to distribute transactions across multiple systems.

58
New cards

spraying attack

often uses accounts passwords stolen from other sites or a short list of the most common passwords, limits the number of attempts to prevent alerts or an account lockout.

59
New cards

UPS

Uninterruptible Power Supply

60
New cards

secure enclave

a protected area for secret information, and is often implemented as a hardware processor in a device.

61
New cards

blockchain

can be used to track or verify components, digital media, votes, and other physical or digital objects.

62
New cards

audit committee

oversees the risk management activities for an organization.

63
New cards

right-to-audit clause

often included in a third-party contract to define the terms and conditions around periodic audits. This is often part of a larger product or services contract.

64
New cards

enumeration

describes the detailed listing of all parts in a particular device.

65
New cards

sanitization

deletes data from storage media and allows the storage device to be used in the future.

66
New cards

certification

If a third-party is providing destruction services, they often will certify the work and document which device serial numbers were destroyed as part of their service.

67
New cards

cross-site scripting

allows a third party to take advantage of the trust a browser might have with another website.

68
New cards

host-based firewall

a firewall that runs on an individual device (like a laptop, server, or workstation) rather than on the network.

69
New cards

air-gapped network

a network that is physically isolated from all other networks, including the internet.

70
New cards

RTOS

(Real-time Operating System) is an OS designed for industrial equipment, automobiles, and other time-sensitive applications

71
New cards

CRL

(Certificate Revocation List) is used to determine if a certificate has been administratively revoked.

72
New cards

Data custodian

manages access rights and sets security controls to the data.

73
New cards

Data processor

manages the operational use of the data, but not the rights and permissions to the information.

74
New cards

TPM

(Trusted Platform Module) is used on individual devices to provide cryptographic functions and securely store encryption keys. Not for web server private keys.

75
New cards

HSM

(Hardware Security Module) is a high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.

76
New cards

SLE

(Single Loss Expectancy) describes the financial impact of a single event.

77
New cards

UEFI

(Unified Extensible Firmware Interface) is the modern replacement for the old BIOS firmware that starts your computer before the operating system loads.

78
New cards

ALE

(Annual Loss Expectancy) is the financial loss over an entire 12-month period.

79
New cards

ARO

(Annualized Rate of Occurrence) is the number of times an event will occur in a 12-month period.

80
New cards

Logic Bomb

is malware that installs and operates silently until a certain event occurs. Once it has been triggered, the results usually involve loss of data or a disabled operating system.

81
New cards

DLP

(Data Loss Prevention) technologies can identify and block the transmission of sensitive data across the network.

82
New cards

IPS

(Intrusion Prevention System) signatures are useful for identifying known vulnerabilities

83
New cards

RADIUS

(Remote Authentication Dial-In User Service) is an authentication protocol commonly used to validate user credentials.

84
New cards

IPsec

(Internet Protocol Security) is a protocol suite for authenticating and encrypting network communication.

85
New cards

CSR

Certificate Signing Request. A file generated by a server or device that contains its public key and identifying information, sent to a CA to request a certificate.

86
New cards

OCSP

Online Certificate Status Protocol. A real-time method for checking whether a certificate is valid or revoked without downloading the entire CRL.

87
New cards

OSINT

Any intelligence gathered from publicly available sources (can be used for cybersecurity, marketing, investigations, etc.).

88
New cards

Log aggregation

a method of centralizing evidence and log files for reporting and future analysis.

89
New cards

SDN

(Software Defined Networking) separates the planes of operation so that infrastructure devices would have a defined control plane and data plane. This allows for more automation and dynamic changes to the infrastructure.

90
New cards

Wireless Deauthentication

would cause users on a wireless network to constantly disconnect.

91
New cards

Partially Known Environment

when the attacker knows some information about the victim, but not all information is available.

92
New cards

Benchmarks

a set of best practices to apply to an application, operating system, or any other service.

93
New cards

DKIM

(Domain Keys Identified Mail) record is a DNS (Domain Name System) entry that includes the public key associated with an email server's digital signatures.

94
New cards

Jump Server

a highly secured device commonly used to access secure areas of another network.

95
New cards

Tokenization

replaces sensitive data with a non-sensitive placeholder.

96
New cards

AAA

(Authentication, Authorization, and Accounting) is a common method of centralizing authentication. Instead of having separate local accounts on different devices, users can authenticate with account information maintained in a centralized database.

97
New cards

Insecure Protocols

will transmit information "in the clear," or without any type of encryption or protection.

98
New cards

Packet Capture

the act of collecting and analyzing network packets to understand or troubleshoot network activity.

99
New cards

Wireshark

captures packets in real time and lets you inspect every detail—IPs, ports, protocols, payloads, etc. Helps with troubleshooting, malware analysis, detecting attacks, and learning how protocols work.

100
New cards

Statement of Work

used during a professional services engagement to detail a list of specific tasks to complete.