supply chain to replication

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/148

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:01 PM on 11/29/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

149 Terms

1
New cards

Supply chain

The network of entities involved in the production and distribution of a product.

2
New cards

Human vectors/social engineering

Methods of manipulating individuals to gain unauthorized access.

3
New cards

Phishing

A fraudulent attempt to obtain sensitive information.

4
New cards

Vishing

A phishing attack conducted over voice calls.

5
New cards

Smishing

A phishing attack conducted over SMS.

6
New cards

Misinformation/disinformation

False or misleading information spread intentionally.

7
New cards

Impersonation

Pretending to be someone else to deceive others.

8
New cards

Business email compromise

A fraudulent email targeting businesses for financial gain.

9
New cards

Pretexting

Creating a false pretense to gain information or access.

10
New cards

Watering hole attack

Compromising a website frequented by a target group.

11
New cards

Brand impersonation

Pretending to be a trusted brand to deceive others.

12
New cards

Typosquatting

Registering a domain similar to a popular one to deceive others.

13
New cards

Segmentation

The practice of dividing a network into smaller subnetworks to enhance security.

14
New cards

Access control list (ACL)

A list of permissions attached to an object that specifies who can access it.

15
New cards

Permissions

The level of access granted to a user or group for a specific resource.

16
New cards

Application allow list

A list of approved applications that are allowed to run on a system.

17
New cards

Isolation

The practice of keeping critical systems separate from less secure systems.

18
New cards

Patching

The process of applying updates and fixes to software or systems.

19
New cards

Encryption

The process of encoding information to make it unreadable without a decryption key.

20
New cards

Monitoring

The act of observing and analyzing system activities to detect and respond to security incidents.

21
New cards

Least privilege

The principle of granting users only the permissions necessary to perform their specific tasks.

22
New cards

Configuration enforcement

Ensuring that systems and devices adhere to established security configurations.

23
New cards

Decommissioning

The process of retiring or removing a system or device from service.

24
New cards

Hardening techniques

Security measures implemented to reduce the vulnerability of a system or network.

25
New cards

Installation of endpoint protection

The deployment of security software on individual devices to protect against threats.

26
New cards

Host-based firewall

A firewall that operates at the individual device level to control network traffic.

27
New cards

Host-based intrusion prevention system (HIPS)

A security system that monitors and analyzes network traffic on an individual device.

28
New cards

Disabling ports/protocols

Turning off specific network ports or protocols to reduce the attack surface.

29
New cards

Default password changes

The requirement for users to change default passwords to enhance security.

30
New cards

Removal of unnecessary software

Uninstalling software that is not required for system functionality.

31
New cards

Application

A software program that performs specific functions on a computer.

32
New cards

Memory injection

A technique of introducing malicious code into a computer's memory.

33
New cards

Buffer overflow

A vulnerability that occurs when a program writes more data to a buffer than it can hold.

34
New cards

Race conditions

A situation where the behavior of a program depends on the relative timing of events.

35
New cards

Time-of-check (TOC)

A security vulnerability that occurs when a resource is checked for authorization but is not protected.

36
New cards

Time-of-use (TOU)

A vulnerability that occurs when a resource is protected but not checked before use.

37
New cards

Malicious update

An intentional modification of software to introduce malicious functionality.

38
New cards

Operating system (OS)-based

A vulnerability specific to a particular operating system.

39
New cards

Web-based

A vulnerability specific to web applications or websites.

40
New cards

Structured Query Language injection (SQLi)

An attack technique that exploits vulnerabilities in a web application's database layer.

41
New cards

Cross-site scripting (XSS)

An attack technique that allows an attacker to inject malicious scripts into web pages.

42
New cards

Hardware

The physical components of a computer system.

43
New cards

Firmware

Software permanently stored in a computer's hardware.

44
New cards

End-of-life

The stage in a product's lifecycle when it is no longer supported by the manufacturer.

45
New cards

Legacy

Outdated technology or software that is still in use.

46
New cards

Virtualization

A technology that allows multiple operating systems to run on a single physical machine.

47
New cards

Virtual machine (VM) escape

A technique of breaking out of a virtual machine and accessing the host system.

48
New cards

Resource reuse

The practice of utilizing resources efficiently by sharing them among users or processes.

49
New cards

Cloud-specific

A security vulnerability specific to cloud computing environments.

50
New cards

Service provider

An organization that offers services to customers.

51
New cards

Hardware provider

An organization that manufactures or supplies hardware components.

52
New cards

Software provider

An organization that develops or supplies software.

53
New cards

Cryptographic

Related to the science of encryption and decryption.

54
New cards

Misconfiguration

A configuration error that can lead to security vulnerabilities.

55
New cards

Mobile device

A portable computing device such as a smartphone or tablet.

56
New cards

Side loading

Installing applications on a mobile device from sources other than the official app store.

57
New cards

Jailbreaking

Removing software restrictions imposed by the manufacturer on a mobile device.

58
New cards

Zero-day

A software vulnerability that is unknown to the vendor and has no patch available.

59
New cards

Device Placement

Strategically positioning network devices to optimize performance.

60
New cards

Security Zones

Segmenting a network into isolated areas based on security requirements.

61
New cards

Attack Surface

The total number of vulnerabilities that can be exploited by an attacker.

62
New cards

Connectivity

The ability of devices to establish and maintain network connections.

63
New cards

Failure Modes

Different ways in which a network device can fail.

64
New cards

Fail-Open

A fail state allowing traffic to pass through, ensuring connectivity.

65
New cards

Fail-Closed

A fail state that blocks traffic, preventing unauthorized access.

66
New cards

Device Attribute

A characteristic or property of a network device.

67
New cards

Active vs. Passive

Modes of operation for network devices; active devices communicate, passive devices observe.

68
New cards

Inline vs. Tap/Monitor

Deployment methods; inline devices directly affect traffic, tap/monitor devices do not.

69
New cards

Network Appliances

Devices designed to perform specific network functions.

70
New cards

Jump Server

A server used to access and manage other devices, enhancing security.

71
New cards

Proxy Server

A server acting as an intermediary between clients and servers.

72
New cards

Intrusion Prevention System (IPS)

A security device that actively blocks potential threats.

73
New cards

Intrusion Detection System (IDS)

A security device that alerts on potential threats.

74
New cards

Load Balancer

A device distributing network traffic across multiple servers.

75
New cards

Sensors

Devices detecting and responding to changes in the network environment.

76
New cards

Port Security

Measures taken to secure network ports from unauthorized access.

77
New cards

802.1X

An IEEE standard for network access control and authorization.

78
New cards

Extensible Authentication Protocol (EAP)

A framework for authentication protocols in network security.

79
New cards

Firewall Types

Different types of firewalls used for network security.

80
New cards

Web Application Firewall (WAF)

A firewall specifically designed to protect web applications.

81
New cards

Unified Threat Management (UTM)

A comprehensive security solution combining multiple security features.

82
New cards

Next-Generation Firewall (NGFW)

A firewall incorporating advanced security capabilities.

83
New cards

Layer 4/Layer 7

Different levels of the network protocol stack.

84
New cards

Secure Communication/Access

Methods used to ensure secure network communication and access.

85
New cards

Virtual Private Network (VPN)

A secure network connection established over a public network.

86
New cards

Remote Access

The ability to access a network remotely.

87
New cards

Tunneling

Encapsulating one network protocol within another for secure communication.

88
New cards

Transport Layer Security (TLS)

A cryptographic protocol securing network communication.

89
New cards

Internet Protocol Security (IPSec)

A protocol suite used to secure IP communications.

90
New cards

Software-Defined Wide Area Network (SD-WAN)

A technology for managing wide area networks.

91
New cards

Secure Access Service Edge (SASE)

A cloud-native security framework providing secure access to applications.

92
New cards

Selection of Effective Controls

Choosing appropriate security measures to mitigate risks.

93
New cards

Responsibility matrix

A matrix defining roles and responsibilities within a project.

94
New cards

Hybrid cloud architecture

Combining both public and private cloud environments.

95
New cards

Third-party vendors

External companies providing products or services.

96
New cards

Infrastructure as code (IaC)

Managing infrastructure through machine-readable definition files.

97
New cards

Serverless computing

A cloud computing model where the provider manages infrastructure.

98
New cards

Microservices architecture

An architectural style structuring an application as small, loosely coupled services.

99
New cards

Network infrastructure

The foundational support for communication between devices.

100
New cards

Physical isolation

Separation of network components physically to enhance security.