Security+ Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/700

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

701 Terms

1
New cards

Security Controls Categories

Technical/Logical, Managerial/Administrative, Operational, Physical

2
New cards

Technical Security Controls (AKA = ?)

AKA = Logical Security Controls

Hardware and Software mechanisms executed by COMPUTER SYSTEMS used to protect systems and data

Ex: Firewalls, IDS's, Encryption

3
New cards

Managerial Security Controls (AKA = ?)

AKA = Administative Controls

Administrative controls focused on REDUCING RISK OF SECURITY INCIDENTS and related to the OVERSIGHT OF A SYSTEM. Documented in WRITTEN POLICIES

Ex: Organizational security policies, Standard Operating Procedures, Risk Assessments, Security Awareness Training

4
New cards

Operational Security Controls

Focused on the DAY-TO-DAY PROCEDURES of an organization. Controls for the HUMAN ELEMENT. Used to ensure EQUIPMENT CONTINUES TO WORK as specified. Primarily IMPLEMENTED AND EXECUTED BY PEOPLE

Ex: Awareness Programs, Configuration Management, System Backups, Patch Management

5
New cards

Physical Security Controls

Security controls designed to DETER, DETECT, AND PREVENT UNAUTHORIZED ACCESS. Measures taken to protect the physical hardware and facilities

Ex: Lighting, locks, fences, badge readers, security guards

6
New cards

Security Control Functions

Preventative, Deterrent, Detective, Corrective, Compensating, Directive

7
New cards

Preventative Security Control Function

Blocking access to a resource

Ex: Encryption, Firewalls, Anti-virus Software

8
New cards

Deterrent Security Control Function

Discourages an intrusion attempt but does not directly block access

Ex: Warning Signs, Lighting, Fencing/Bollards

9
New cards

Detective Security Control Function

Identify and log intrusion attempts

Ex: Log Monitoring, Security Audits, CCTV, IDS, Vulnerability Scanning

10
New cards

Corrective Security Control Function

Apply new controls after an intrusion attempt has been detected

Ex: Recovering data from backups, applying software updates and patches, IRPs, DRPs

11
New cards

Compensating Security Control Function

Using temporary means to prevent exploitation of a weakness because existing controls are not sufficient

Ex: Backup Power Systems

NOT Compensating: MFA, App Sandboxing, Network Segmentation

12
New cards

Directive Security Control Function

Directing a subject towards security compliance through POLICIES AND PROCEDURES

Ex: IRP, AUP

NOT Directive: MFA, IDS, IPS

13
New cards

CIA Triad (AKA = ?)

Definition of Each?

AKA AIC Triad

Used to describe the BASIC PRINCIPLES OF INFORMATION SECURITY

Confidentiality: Ensuring information is accessible only to those authorized to access it. Ex: Encryption, Access Controls, Data Classification

Integrity: Ensuring information is accurate and complete and has not been altered in an unauthorized manner. Ex: Hashing, Digital Signatures, Certificates, Non-Repudiation

Availability: Ensuring information and systems are available to authorized users when they are needed. Ex: Redundancy, Backups, Load Balancing/Failover

14
New cards

Non-Repudiation

Ensures that someone cannot deny the validity of their actions/communications by providing proof of the origin and integrity of the data sent by the Sender. The Sender cannot deny sending the info and the Receiver cannot deny receiving it

15
New cards

Proof of Origin

Methods?

Ensures the authenticity of the Sender of a message. Methods include Digital Signatures, PKI, and Certificates

16
New cards

AAA Framework

Definition of Each?

Authentication, Authorization, Accounting

Authentication: Verifying the identity of a user/device/entity BEFORE granting access to a NETWORK/SYSTEM. Ex: Passwords, Biometrics, Tokens

Authorization: Determining what resources or services an AUTHENTICATED USER is allowed to access AND what actions they are permitted to perform. Ex: Access Control Models (DAC, MAC, RBAC, ABAC), Access Control Lists

Accounting: TRACKING AND LOGGING user activities, resource usage, and actions taken within a system

17
New cards

Gap Analysis

What are the Steps?

Assessment of the differences between where we are and where we want to be

Steps: Define Objectives, Assess Current State (people and processes), Identify Desired State, Analyze Gaps, Develop Action Plan

18
New cards

Zero Trust

A security framework that operates on the principle of "Never Trust, Always Verify". Assumes that threats can come from BOTH inside AND outside the network. EVERY access request should be verified, authenticated, and authorized regardless of origin

19
New cards

Planes of Operation

Part of the Zero Trust Framework

Splits the Network into functional planes:

Management Plane: Secures administrative access. Techniques include MFA, RBAC, and encryption of administrative traffic

Data Plane: Processes data frames, packet forwarding, and network data. Includes encryption, data integrity checks, firewall rules

Control Plane: Manages the ACTIONS of the Data Plane. Defines policies and rules, determines how packets should be forwarded, and includes route authentication and protocol hardening

Example: Physical Switch. Data Plane involves all of the interfaces used to move data from one part of the network to another. Control Plane involves the configuration of the device

20
New cards

Adaptive Identity

Adjusting access controls and authentication requirements based on the context and risk level associated with a user and access request. Uses Risk Indicators such as relationship to org, physical location, device health, connection type, IP address, etc

21
New cards

Threat Scope Reduction

Decreasing the number of possible entry points of a network

22
New cards

PDAC

Policy-Driven Access Control

Combines Adaptive Identity with a predefined set of rules. Policies define the rules and conditions under which access is granted/denied, and can be dynamic based on Risk Indicators

23
New cards

PEP

Policy Enforcement Point

The MAIN COMPONENT of the DATA PLANE. A point in the network that is responsible for ENFORCING ACCESS CONTROL POLICIES by acting as the gate keeper to a network based on the CONTROL PLANE POLICIES. Can consist of multiple components working together. Enforces decisions made by the PDP

24
New cards

PDP

Policy Decision Point

The MAIN COMPONENT of the CONTROL PLANE. Evaluates access requests against defined security policies and makes AUTHORIZATION DECISIONS, then provides those decisions to the PEP. Consists of 2 parts, the Policy Engine and Policy Administrator.

25
New cards

PE

Policy Engine

Part of the PDP. Decides EACH ACCESS DECISION based on policies and other information

26
New cards

PA

Policy Administrator

Part of the PDP. Tells the PEP the POLICY ENGINE'S DECISION. Also generates ACCESS TOKENS/CREDENTIALS

27
New cards

Honeypots

Types?

A security mechanism designed to ATTRACT AND TRAP ATTACKERS by mimicking a LEGITIMATE TARGET. 2 Types: Low Interaction (limited in functionality) and High Interaction (sims a full-fledged system)

28
New cards

Honeynets

A NETWORK OF HONEYPOTS designed to attract and analyze malicious activity. Emulates a REAL NETWORK ENVIRONMENT

29
New cards

Honeyfiles

Decoy files placed into a network or system that contains FAKE INFORMATION. Often used as BAIT FOR HONEYNETS

30
New cards

Honeytokens

Acts as BAIT for Attackers and is used to TRACK THE ATTACKER. Adds TRACEABLE DATA to a Honeynet. Can be embedded within legit data and apps

31
New cards

Change Management

Need Clear Documentation For?

Process?

The structured approach of PLANNING, IMPLEMENTING, AND MONITORING CHANGES in an organization's IT infrastructure, systems, policies, or processes

Need Clear Documentation For: Frequency, Duration, Installation Process, Fallback Procedures

Process:

Determine SCOPE OF CHANGE

Analyze the RISK ASSOCIATED with the Change

Create a CHANGE PLAN

Get END-USER APPROVAL

Present Proposal to the CHANGE CONTROL BOARD

Have a BACKOUT PLAN if Change Doesn't Work

DOCUMENT THE CHANGE

32
New cards

Change Approval Process

What are the steps?

Process of evaluating, approving, and managing changes

Steps: Change Request Submitted, Initial Assessment, Change Evaluation, Change Approval, Implementation Planning, Testing and Validation, Change Deployment, Post-Implementation Review

33
New cards

Sandbox Testing Environment

A CONTROLLED AND ISOLATED replica of the PROD environment where SOFTWARE, APPS, AND CHANGES can be tested with NO CONNECTION to the actual PROD or the real world

34
New cards

Backout Plan

A SUREFIRE WAY TO REVERT CHANGES that are planned to be made

35
New cards

Allow/Deny List

What does Allow and Deny mean? Examples of Lists?

Security mechanism used to control ACCESS TO RESOURCES, SYSTEMS, OR NETWORKS based on predefined criteria.

ALLOW = NOTHING runs unless approved

DENY = EVERYTHING can run EXCEPT things on the list

Examples: IP Addresses, Applications, User Access Controls

36
New cards

Downtime

Period during which a SYSTEM, APP, SERVICE, OR NETWORK is UNAVAILABLE/NOT OPERATIONAL

37
New cards

PKI

Public Key Infrastructure

A hierarchical system for CREATION, MANAGEMENT, STORAGE, DISTRIBUTION, AND REVOCATION OF DIGITAL CERTIFICATES AND MANAGEMENT OF PUBLIC-KEY ENCRYPTION, ensuring that public keys are associated with their respective owners.

38
New cards

RA

Registration Authority

An entity in the PKI framework that is RESPONSIBLE FOR ACCEPTING REQUESTS FOR DIGITAL CERTIFICATES AND VERIFYING/AUTHENTICATING THE ENTITY REQUEST before a digital certificate is ISSUED. Acts as an INTERMEDIARY between the CA and User

39
New cards

CA

Process?

Certificate Authority

A TRUSTED THIRD PARTY in the PKI framework that is RESPONSIBLE FOR ISSUING, VALIDATING, AND REVOKING DIGITAL CERTIFICATES

Process:

1. Applicant creates THEIR KEY PAIR and SENDS THE PUBLIC KEY TO THE CA to be signed

2. RA VALIDATES THE REQUEST and the CA DIGITALLY SIGNS the Certificate using the CA's PRIVATE KEY and returns it

40
New cards

CRL

Certificate Revocation List

A LIST OF THE DIGITAL CERTIFICATES THAT HAVE BEEN REVOKED BY THE CA. Is a PERIODIC PUBLICATION of the certificates that have been revoked

41
New cards

CSR

Contains What Info?

Certificate Signing Request

A message sent FROM A DIGITAL CERTIFICATE APPLICANT to the CA to APPLY FOR A DIGITAL CERTIFICATE. Contains information that will be included in the certificate, including PUBLIC KEY, APPLICANT NAME, DOMAIN NAME, LOCALITY

42
New cards

OCSP

Online Certificate Status Protocol

A PROTOCOL that enables ON-DEMAND QUERYING of the REVOCATION STATUS OF AN X.509 DIGITAL CERTIFICATE IN REAL-TIME. The FASTEST WAY to check the validity of a DIGITAL CERTIFICATE

43
New cards

DN

Distinguished Name

A UNIQUE IDENTIFIER used in directory services and digital certificates to SPECIFY AN ENTITY'S IDENTITY in a hierarchical structure

44
New cards

PKCS

Famous Standards?

Public Key Cryptographic Standards

A set of STANDARDS developed to facilitate SECURE COMMUNICATION AND DATA EXCHANGE USING PUBLIC KEY CRYPTOGRAPHY. Defines various cryptographic techniques including FORMATS FOR PUBLIC KEYS, PRIVATE KEYS, DIGITAL SIGNATURES, AND DIGITAL CERTIFICATES

Famous Standards:

#1: RSA Encryption Algorithm

#5: Password-based Cryptography

#7: Cryptographic Message Syntax (CMS)

#10: Format of CERTIFICATE SIGNING REQUESTS (CSRs)

#11: Specifies CRYPTOKI API for interacting with cryptograhpic tokens

#12: Defines secure and portable file format for STORING AND EXCHANGING PII

#13: Defines standards for Elliptic Curve Cryptography (ECC)

45
New cards

Symmetric Encryption (AKA = ?)

AKA Secret Key Encryption, Single Key Encryption, Private Key Encryption

Utilizes a SINGLE SHARED SECRET KEY to both ENCRYPT and DECRYPT data. VERY FAST - less overhead than Asymmetric encryption. DOES NOT SCALE WELL

46
New cards

Asymmetric Encryption (AKA = ?)

AKA Public Key Encryption, Two-Key Encryption

Utilizes a PAIR OF MATHEMATICALLY RELATED KEYS, one key (the PUBLIC KEY - so that ANYONE can ENCRYPT DATA) for ENCRYPTION and one key (the PRIVATE KEY - so that ONLY ONE PERSON can DECRYPT DATA) for DECRYPTION.

47
New cards

Key Escrow

A THIRD PARTY managing your PRIVATE KEYS

48
New cards

Database Encryption

Ensures the protection of STORED DATA and TRANSMISSION OF THAT DATA

49
New cards

Transparent Encryption

A method of ENCRYPTING DATA AT THE STORAGE LEVEL and ensuring the data REMAINS ENCRYPTED THROUGHOUT ITS LIFECYCLE within a DB. Involves using a SYMMETRIC KEY to ENCRYPT data before it is written to storage and DECRYPT data when it is requested

50
New cards

Record-Level Encryption

Encrypts INDIVIDUAL COLUMNS and uses SEPARATE SYMMETRIC KEYS for EACH COLUMN

51
New cards

Transport Encryption

Securing data that is TRAVERSING THE NETWORK

52
New cards

VPN

Common Protocols?

Virtual Private Network

Creates a SECURE AND ENCRYPTED CONNECTION that ENCRYPTS ALL DATA TRANSMITTED over the connection. An ENCRYPTED TUNNEL used to establish a secure connection between the USER AND VPN SERVER

Common Protocols: OpenVPN, IPsec, SSL/TLS

53
New cards

IPsec

Internet Protocol Security

A SUITE OF PROTOCOLS AND TECHNOLOGIES designed to ensure SECURE EXCHANGE OF PACKETS AT THE IP LAYER. Provides ENCRYPTION, AUTHENTICATION, AND DATA INTEGRITY for network traffic between 2 systems

54
New cards

AH

Authentication Header

Part of IPsec suite. Provides DATA INTEGRITY, AUTHENTICATION OF SENDER, AND PROTECTION AGAINST REPLAY ATTACKS. Does NOT provide ENCRYPTION

55
New cards

ESP

Encapsulating Security Payload

Part of IPsec suite. Provides CONFIDENTIALITY (ENCRYPTION), INTEGRITY, AND AUTHENTICATION

56
New cards

SAs

Security Associations

Part of IPsec suite. Establishes the PARAMETERS for IPsec connections, such as the ENCRYPTION ALGORITHM AND KEY EXCHANGE MECHANISM

57
New cards

SPD

Security Policy Database

Part of IPsec suite. Defines the SECURITY POLICIES FOR NETWORK TRAFFIC in IPsec. Specifies SECURITY REQUIREMENTS for how DATA PACKETS should be handled

58
New cards

PFS

Perfect Forward Secrecy

A cryptographic feature that ENSURES SECURITY OF ENCRYPTED COMMUNICATION even if the Private Key is COMPROMISED. EACH SESSION HAS ITS OWN KEY, so the compromise of one key DOESN'T AFFECT security of other sessions

59
New cards

Site-to-Site VPN

Connects MULTIPLE NETWORKS securely OVER THE INTERNET

<p>Connects MULTIPLE NETWORKS securely OVER THE INTERNET</p>
60
New cards

TLS

Transport Layer Security

A CRYPTOGRAPHIC PROTOCOL designed to PROVIDE SECURE COMMUNICATION OVER A COMPUTER NETWORK. REPLACED SSL

61
New cards

SSL

Secure Sockets Layer

A CRYPTOGRAPHIC PROTOCOL designed to provide secure communication OVER A COMPUTER NETWORK. DEPRECATED and REPLACED BY TLS

62
New cards

STARTTLS

A PROTOCOL COMMAND used to UPGRADE AN EXISTING INSECURE CONNECTION to a SECURE CONNECTION USING TLS. Commonly used in EMAIL TRANSMISSION

63
New cards

Key Stretching

A cryptographic technique that ENHANCES SECURITY OF SENSITIVE DATA by REPEATEDLY APPLYING A RESOURCE-INTENSIVE FUNCTION to the input data, thus making a WEAKER KEY STRONGER

64
New cards

Out-of-Band Exchange

Transfer of data/info through a SEPARATE, INDEPENDENT CHANNEL from the MAIN CHANNEL. Used to send SENSITIVE INFO through a path that is NOT SUSCEPTIBLE TO THE SAME VULNERABILITIES AS THE MAIN CHANNEL

65
New cards

In-Band Exchange

How to Deliver a Symmetric Key?

Transfer of data/info through the SAME COMMUNICATION CHANNEL as the MAIN CHANNEL.

Ex: Using ASYMMETRIC ENCRYPTION to deliver a SYMMETRIC KEY.

1. Create symmetric key

2. Use the PUBLIC KEY to encrypt the symmetric key

3. Send the ENCRYPTED SYMMETRIC KEY via In-Band Exchange. The recipient can use the PRIVATE KEY to get the symmetric key

66
New cards

Session Keys

What is the Process?

TEMPORARY encryption keys for SECURING A SINGLE COMMUNICATION SESSION between 2 parties. Generated for EACH SESSION and discarded at the end of the session

Process:

1. Client encrypts a RANDOM SYMMETRIC KEY and the SERVER'S PUBLIC KEY = SESSION KEY. The Client shares it with the Server

2. The Server DECRYPTS the SESSION KEY and uses the Session Key to ENCRYPT THE DATA THE CLIENT REQUESTS

67
New cards

TPM

Trusted Platform Module

An EMBEDDED MICROCONTROLLER used for SECURE BOOT, DISK ENCRYPTION, and SYSTEM INTEGRITY VERIFICATION. Also stores ENCRYPTION KEYS, DIGITAL CERTS, AND OTHER CRITICAL SECURITY INFO

68
New cards

HSM

Hardware Security Module

A DEDICATED HARDWARE DEVICE with ASSOCIATED SOFTWARE/FIRMWARE that PROVIDES A SECURE ENVIRONMENT FOR MANAGING AND PROTECTING CRYPTOGRAPHIC KEYS AND PERFORMING CRYPTOGRAPHIC OPERATIONS

69
New cards

KMS

Key Management System

A framework of POLICIES, PROCEDURES, TECHNOLOGIES used to MANAGE ALL CRYPTOGRAPHIC KEYS from a CENTRALIZED MANAGER throughout their lifecycle, including key GENERATION, DISTRIBUTION, STORAGE, ROTATION, ARCHIVAL, AND DESTRUCTION. Can be an HSM, software-based, or cloud-based

70
New cards

Secure Enclave

A PROTECTED/ISOLATED HARDWARE/SOFTWARE ENVIRONMENT within a computing device where SENSITIVE DATA AND CRYPTOGRAPHIC OPERATIONS CAN BE STORED AND PROCESSED SECURELY. Designed to ensure confidentiality and integrity of code and data EVEN IF THE MAIN OS IS COMPROMISED

71
New cards

Obfuscation

Techniques employed to OBSCURE/HIDE THE TRUE MEANING OF DATA, making it challenging for UNAUTHORIZED parties to DECIPHER/REVERSE-ENGINEER the info.

"Hiding information in plain sight"

72
New cards

Steganography

Concealing information INSIDE A SEEMINGLY INNOCUOUS PIECE OF DATA (images, TCP packets, audio, video)

73
New cards

Tokenization

Replacing SENSITIVE DATA with a NONSENSITIVE EQUIVALENT which HOLDS A REFERENCE TO THE ORIGINAL DATA and enables its processing but has no value if breached

74
New cards

Data Masking

HIDING PART of the ORIGINAL DATA. Protects PII. May STILL BE INTACT IN STORAGE and only be HIDDEN from view

75
New cards

Hashes

Characteristics?

A way to REPRESENT DATA as A FIXED-SIZE OUTPUT

Characteristics:

Can be used as a DIGITAL SIGNATURE.

A ONE-WAY cryptographic function.

Good hashes have HIGH DIFFUSION (SMALL plaintext change = BIG ciphertext change) AND HIGH CONFUSION (deriving the plaintext from the ciphertext is DIFFICULT) rates.

Collisions ARE possible.

76
New cards

Hash Collision

When 2 DISTINCT pieces of data result in the SAME HASH VALUE when using the SAME HASH FUNCTION

77
New cards

Salting

Adding a UNIQUE, RANDOM VALUE to EACH PASSWORD BEFORE it is hashed. Enhances security of Passwords AGAINST RAINBOW TABLES OR BRUTE FORCE

78
New cards

Digital Signature

What is the Process?

A CRYPTOGRAPHIC TECHNIQUE that VERIFIES THE AUTHENTICITY, INTEGRITY, and NON-REPUDIATION of DIGITAL DOCUMENTS/MESSAGES by using a UNIQUE ENCRYPTED IDENTIFIER from the SENDER.

Sender signs with their PRIVATE KEY, Receiver can verify with the SENDER'S PUBLIC KEY. Any change in the message invalidates the signature

79
New cards

Blockchain

An OPEN PUBLIC LEDGER to keep track of transactions

80
New cards

Open Public Ledger

A DISTRIBUTED DATABASE stored across MULTIPLE COMPUTERS IN A P2P NETWORK.

Ex: Blockchain

81
New cards

Digital Certificate

Standard Format?

A DIGITAL DOCUMENT used to VERIFY THE IDENTIFY of an individual, device, service, or organization in online communications. Used to verify the OWNERSHIP OF A PUBLIC KEY

Standard Format: X.509. Contains Serial #, Version, Issuer, Name of Certificate Holder, Public Key

82
New cards

SAN

Subject Alternative Name

An EXTENSION of the X.509 Digital Certificate Format that ALLOWS USERS TO SPECIFY ADDITIONAL HOST NAMES for a SINGLE SSL/TLS CERTIFICATE

83
New cards

OCSP Stapling

The OCSP status is INCLUDED IN THE SSL/TLS HANDSHAKE that is DIGITALLY SIGNED BY THE CA. This enables Clients to QUERY A RESPONDER to determine whether a certificate is STILL VALID

84
New cards

Threat Actor

Entity that is responsible for an event that HAS AN IMPACT ON THE SAFETY OF ANOTHER ENTITY

85
New cards

Threat Actor Attributes

The CHARACTERISTICS of the Attacker

Internal v External

Level of Resources

Level of Sophistication/Capability

Motivations

86
New cards

Threat Actor Types

Nation State

Unskilled Attacker

Hacktivist

Insider Threat

Organized Crime

Shadow IT

87
New cards

Nation State Threat Actor Attributes

External

Massive Resources - can attack constantly

Highest Sophistication

Motivations: Espionage, Political/Philosophical Beliefs, Disruption/Chaos, War

88
New cards

APT

Advanced Persistent Threat

A PROLONGED AND SOPHISTICATED CYBERATTACK often carried out by WELL-FUNDED and ORGANIZED groups. Often, an Intruder will GAIN ACCESS TO A NETWORK and remain UNDETECTED FOR AN EXTENDED PERIOD

89
New cards

Unskilled Attacker Threat Actor Attributes

Internal OR External

Low Resources

Low Sophistication

Motivations: Disruption/Chaos, Financial Gain, Revenge

90
New cards

Hacktivist Threat Actor Attributes

External

Low to Medium Resources

Low to Medium Sophistication

Motivations: Ethical Beliefs, Philosophical/Political Beliefs, Disruption/Chaos

91
New cards

Insider Threat Threat Actor Attributes

Internal

Low to High Resources

Low to High Sophistication

Motivations: Revenge, Financial Gain, Service Disruption

92
New cards

Organized Crime Threat Actor Attributes

External

Medium to High Resources

Medium to High Sophistication

Motivations: Financial Gain, Data Exfil, Extortion

93
New cards

Shadow IT Threat Actor Attributes

Internal

Low to Medium Resources

Low to Medium Sophistication

Motivations: Convenience, Lack of Security Awareness, Meeting Specific Needs

94
New cards

Threat Vector / Attack Vector - Definitions/How Differ?

Threat Vector: A PATH/MEANS by which an Attacker can INTRODUCE/DELIVER a CYBER THREAT to a TARGET SYSTEM (i.e. How the Attacker can exploit a vulnerability or introduce an attack.)

Attack Vector: A PATH/MEANS by which an Attacker can GAIN ACCESS TO A COMPUTER/SERVER in order to DELIVER A PAYLOAD/MALICIOUS OUTCOME (i.e. The ATTACK the Attacker uses.)

95
New cards

Types of Attack Vectors

Message-Based: Email, SMS, Phishing, Social Engineering

Image-Based: An image that can also contain an XML file

File-Based: Executables that can be hidden in other file types (PDF, ZIP/RAR, MS Office)

Voice Call: Vishing, Spam Over IP, War Dialing

Removable Device: USB Devices

Vulnerable Software: Client-based (infected executables) OR Agentless (compromised SOFTWARE on a Server - infects all users)

Unsupported System: Outdated systems that no longer receive patches

Unsecure Network: Wireless (outdated protocols like WEP, WPA, WPA2, WPS or open networks), Wired (unsecure interfaces that don't follow 802.1X)

Open Service Ports: TDP/UDP Ports - each App has its own Port

Default Credentials

Supply Chain: Tampering with the underlying infra/manufacturing process

96
New cards

SVG

Scalable Vector Graphic

An IMAGE-BASED VECTOR. More than just an image - contains an XML FILE THAT ALLOWS YOU TO EMBED OTHER INFO. Can perform HTML INJECTION

97
New cards

Vishing

Phishing OVER THE PHONE

98
New cards

Spam Over IP

Using VOICE OVER IP (VOIP) SYSTEMS to SEND LARGE-SCALE PHONE CALLS

99
New cards

War Dialing

Finding UNPUBLISHED phone numbers that MAY GIVE ATTACKERS ACCESS TO A SYSTEM

100
New cards

Air-Gapped Network

A security measure that involves PHYSICALLY isolating a computer/network from ANY OTHER NETWORK, including the Internet.

The system is NOT connected to any other networks/systems so DATA TRANSFER MUST OCCUR VIA PHYSICAL MEANS.