1/112
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Vulnerability classification
Categorizing vulnerabilities based on their characteristics.
Exposure factor
Measure of the potential impact of a vulnerability.
Environmental variables
Factors that influence the impact of a vulnerability in a specific environment.
Industry/organizational impact
Assessing the impact of vulnerabilities on specific industries or organizations.
Risk tolerance
An organization's willingness to accept or mitigate risks.
Vulnerability response and remediation
Actions taken to address and fix vulnerabilities.
Patching
Applying updates or fixes to software to address vulnerabilities.
Insurance
Coverage to mitigate financial losses due to cybersecurity incidents.
Segmentation
Dividing a network into smaller segments to contain potential attacks.
Compensating controls
Alternate security measures implemented to mitigate vulnerabilities.
Exceptions and exemptions
Allowances made for specific cases where vulnerabilities cannot be immediately addressed.
Validation of remediation
Process of verifying that vulnerabilities have been successfully addressed.
Rescanning
Performing another vulnerability scan after remediation.
Audit
Examination of systems/processes to ensure compliance and effectiveness.
Verification
Confirming that vulnerabilities have been fixed and are no longer present.
Reporting
Documenting and communicating the findings and actions taken.
Monitoring computing resources
The process of tracking and observing computer systems, applications, and infrastructure to ensure their optimal performance, security, and availability.
Log aggregation
The practice of collecting and consolidating log data from various sources.
Alerting
The act of notifying users or administrators about potential issues.
Scanning
The process of examining computer systems or networks to identify vulnerabilities.
Archiving
The practice of storing data for long-term retention and future reference.
Quarantine
The act of isolating potentially compromised systems or resources.
Alert tuning
The adjustment of alert settings to improve detection accuracy.
Security Content Automation Protocol (SCAP)
A set of standards for automating security-related tasks.
Benchmarks
Reference points or standards used to evaluate and measure performance.
Security information and event management (SIEM)
A system that collects and analyzes security event data.
Antivirus
Software designed to detect, prevent, and remove malicious software.
Data loss prevention (DLP)
Technologies aimed at preventing unauthorized access or leakage of sensitive data.
Simple Network Management Protocol (SNMP) traps
Notifications sent by network devices for monitoring.
NetFlow
A network protocol used for monitoring IP traffic information.
Vulnerability scanners
Tools that identify and assess vulnerabilities in systems.
Firewall
A security device that monitors and controls network traffic based on rules.
Access lists
Lists of rules that determine network traffic permissions.
IDS/IPS
Security systems that monitor network traffic for suspicious activity.
Trends
Patterns in network security threats and attacks.
Signatures
Patterns of known malicious activity used by IDS/IPS systems.
Web filter
A security tool that blocks or filters web content based on rules.
Centralized proxy
A server that acts as an intermediary between client devices and the internet.
URL scanning
The process of analyzing URLs to determine if they are safe.
Content categorization
The classification of web content into categories.
Block rules
Rules that prevent access to specific websites or web content.
Reputation
A measure of the trustworthiness of a website or IP address.
Operating system security
Measures to protect the OS from unauthorized access or attacks.
Group Policy
A feature in Windows that allows administrators to manage security settings.
SELinux
A security framework for Linux providing access control policies.
Secure protocols
Configuring and using communication protocols to protect data.
DNS filtering
Blocking or allowing access to websites based on DNS queries.
Email security
Measures to protect email communication from unauthorized access.
DMARC
An email authentication protocol to prevent email spoofing.
DKIM
An email authentication method allowing the sender to digitally sign emails.
SPF
An email authentication protocol verifying the sender's IP address.
Gateway
A network device acting as an entry point and providing security features.
File integrity monitoring
The process of monitoring and detecting unauthorized changes to files.
DLP
Data Loss Prevention measures to prevent unauthorized disclosure of sensitive data.
Network access control
A solution that controls network access based on device compliance.
Endpoint detection and response
Solutions that monitor and respond to threats on individual devices.
User behavior analytics
The analysis of user actions to detect and prevent security threats.
Provisioning user accounts
The process of creating user accounts.
De-provisioning user accounts
The process of removing user accounts.
Permission assignments
Assigning permissions to users.
Identity proofing
Verifying the identity of a user.
Single sign-on (SSO)
A mechanism allowing users to authenticate once and access multiple systems.
Lightweight Directory Access Protocol (LDAP)
A protocol for accessing and managing directory information.
Open authorization (OAuth)
A framework for granting access to resources without sharing passwords.
Security Assertions Markup Language (SAML)
An XML-based framework for exchanging authentication and authorization data.
Interoperability
The ability of different systems to work together.
Attestation
The process of verifying the integrity and authenticity of a system.
Access controls
Mechanisms used to regulate access to resources.
Mandatory access control
Access control based on predefined rules and policies.
Discretionary access control
Access control based on the resource owner's discretion.
Role-based access control
Access control based on the roles assigned to users.
Least privilege
Granting users the minimum privileges necessary to perform their tasks.
Multifactor authentication
Using multiple factors to verify a user's identity.
Biometrics
Using unique physical or behavioral characteristics for authentication.
Factors
Categories of information used for authentication.
Password concepts
Various aspects related to passwords.
Password best practices
Guidelines for creating and managing secure passwords.
Password length
The number of characters in a password.
Password complexity
The use of different types of characters in a password.
Password reuse
Using the same password for multiple accounts.
Password expiration
Requiring users to change their passwords after a certain period.
Password managers
Tools for securely storing and managing passwords.
Privileged access management tools
Software solutions for managing and controlling privileged access.
User Provisioning
Automating the process of creating and managing user accounts.
Resource Provisioning
Automating the allocation and management of resources.
Guard Rails
Automated policies and restrictions to ensure compliance.
Continuous Integration and Testing
Automating the integration and testing of code changes.
Process
A series of steps taken to achieve a specific goal.
Preparation
Making arrangements to effectively respond to cybersecurity threats.
Detection
Identifying potential cybersecurity threats within a system.
Containment
Implementing measures to control and limit the impact of a cybersecurity threat.
Eradication
The complete removal of a cybersecurity threat from a system.
Recovery
Restoring a system to a normal state after an incident.
Lessons learned
Knowledge gained from past experiences with cybersecurity incidents.
Training
The action of educating individuals on cybersecurity skills.
Testing
Evaluating a system to verify that it meets cybersecurity requirements.
Digital forensics
Collecting and analyzing electronic evidence in cybersecurity investigations.
Reporting
Providing a detailed account of a cybersecurity event or incident.
E-discovery
Identifying and producing electronically stored information in a lawsuit.
Risk identification
The process of identifying potential risks in a specified context.