Ben's Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/144

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

145 Terms

1
New cards

Application Attack

Malicious activities or techniques targeting web applications.

2
New cards

Buffer overflow

Occurs when a buffer exceeds its storage capacity, leading to data spillover into other memory locations.

3
New cards

SSL Stripping

A MITM attack downgrading secure HTTPS connections to insecure HTTP connections.

4
New cards

Pass the Hash

Hacking technique using hashed values for authentication.

5
New cards

Directory traversal attack

Unauthorized access attempt to bypass restrictions and execute commands on a web server.

6
New cards

Race condition

Data inconsistencies and vulnerabilities due to multiple processes sharing resources without synchronization.

7
New cards

Application whitelisting

Only approved software allowed to run on a system.

8
New cards

Refactoring

Enhancing code structure without altering external behavior.

9
New cards

Shimming

Code layer enhancing compatibility between software components.

10
New cards

RFC (Request for Comment)

document series that sets the standards of design, development, and implementation of internet standards

11
New cards

CVE (Common Vulnerabilities and Exposures)

document series that sets the standards of design, development, and implementation of internet standards

12
New cards

NVD (National Vulnerability Database)

Government repository for vulnerability management data.

13
New cards

TTP (Tactics, Techniques, and Procedures)

Methods used by attackers in conducting attacks.

14
New cards

CVSS (Common Vulnerability Scoring System)

Framework quantifying security vulnerability severity.

15
New cards

STIX (Structured Threat Information Expression)

Framework for exchanging cybersecurity threat intel.

16
New cards

TAXII (Trusted Automated Exchange Indicator Information)

Framework for relaying cybersecurity threat information.

17
New cards

HIPS (Host-based Intrusion Prevention System)

Security tech protecting hosts from intrusions malicious activities.

18
New cards

SIEM (Security Information and Event Management)

Collects log data and takes security actions.

19
New cards

PCAP (Packet Capture)

Software tool analyzing network traffic.

20
New cards

SOAR (Security Orchestration, Automation, and Response)

combines security orchestration and automation with incident response to improve efficiency of security operations

21
New cards

DLP (Data Loss Prevention)

Defines data sharing and protection to prevent unauthorized access.

22
New cards

Hot Site

Fully operational off-site facility.

23
New cards

Warm Site

Partially equipped off-site facility.

24
New cards

Cold Site

Off-site facility with physical space but lacking technological infrastructure.

25
New cards

MSP (Managed Service Provider)

Ensures operational IT systems.

26
New cards

MSSP (Managed Security Service Provider)

Ensures secure and reliable IT operations.

27
New cards

Data sanitization

Erasing data to prevent recovery.

28
New cards

Normalization

Standardizing data format.

29
New cards

Baselining

Monitoring network performance by comparing to historical levels.

30
New cards

Code obfuscation

Making applications challenging to disassemble.

31
New cards

VM Sprawl

Ineffective management due to excessive virtual machines.

32
New cards

VM escape

Attacker gaining hypervisor access through VM code.

33
New cards

OWASP (Open Worldwide Application Security Project)

Community providing web app security resources.

34
New cards

TOTP (Time-based One Time Password)

Algorithm generating one-time passwords.

35
New cards

FAR (False Acceptance Rate)

Rate of unauthorized access in biometric security.

36
New cards

FRR (False Rejection Rate)

Rate of authorized user rejection in biometric security.

37
New cards

RAID (Redundant Array of Independent Disks)

Technology combining hard drives for performance and redundancy.

38
New cards

UPS (Uninterruptible Power Supply)

Emergency power source.

39
New cards

Restore point

File-based representation of a VM's current state.

40
New cards

RSA (Rivest-Shamir-Adleman)

RSA is one of the most widely used asymmetric encryption algorithms. It relies on the difficulty of factoring large prime numbers. The algorithm generates a public-private key pair, where the public key is used for encryption, and the private key is used for decryption. RSA is often employed in secure email communication, SSL/TLS protocols, digital signatures, and key exchange.

41
New cards

Diffie-Hellman (DH)

Diffie-Hellman is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure communication channel. It enables secure communication even if an eavesdropper intercepts the exchange. Diffie-Hellman is used in various protocols such as SSL/TLS, IPsec, and secure email

42
New cards

ECC (Elliptic Curve Cryptography)

ECC is a family of asymmetric algorithms based on the mathematics of elliptic curves over finite fields. ECC provides the same level of security as RSA but with smaller key sizes, making it computationally efficient. It is commonly used in resource-constrained environments such as mobile devices and Internet of Things (IoT) devices. ECC is utilized in SSL/TLS, digital signatures, and secure key exchange.

43
New cards

DSA (Digital Signature Algorithm)

DSA is a widely used algorithm for creating and verifying digital signatures. It provides authentication, integrity, and non-repudiation of digital documents. DSA uses the mathematics of modular exponentiation and discrete logarithms. It is commonly used in digital certificates, secure email, and secure file transfers

44
New cards

DNSSEC

Ensures secure communication with correct websites.

45
New cards

Incremental backups

Backing up changed data since the last backup.

46
New cards

Snapshot backups

Capturing system state at a specific time.

47
New cards

SCADA (Supervisory Control and Data Acquisition)

Monitors and controls industrial processes and infrastructure.

48
New cards

ICS (Industrial Control System)

Controls industrial systems, often with SCADA.

49
New cards

MFD/MFP (Multi-Function Device/Multi-Function Printer)

Device combining multiple functionalities.

50
New cards

RTOS (Real-time Operating System)

OS for real-time applications when timing is critical.

51
New cards

POSIX (Portable Operating System Interface)

standards that define an interface between applications and operating systems

52
New cards

HSM (Hardware Security Module)

a hardware device securing cryptographic keys and operations.

53
New cards

Zigbee

wireless communication protocol for low-power, low-data rate devices (IoT devices)

54
New cards

ANT+

Wireless protocol for low-latency sports/health monitoring.

55
New cards

Extranet

Extended network access for external parties.

56
New cards

Degaussing

Erasing data from magnetic media.

57
New cards

tail

Displays the last part of a file or stream.

58
New cards

openssl

Open-source library for cryptography.

59
New cards

grep

Searches and filters text based on patterns.

60
New cards

Nmap

Network scanning

61
New cards

MTTR (Mean Time To Recovery)

The amount of time it’ll take to repair a system

62
New cards

MTTF (Mean Time to Failure)

The amount of time until a system is expected to fail

63
New cards

RTO (Recovery Time Objective)

The maximum amount of time that is tolerable to have the systems down

64
New cards

DAC (Discretionary Access Control)

Access to a resource is outlined by the owner

65
New cards

COPE (Corporate Owned Personally-Enabled)

MDM strategy where organizations provide devices, while allowing limited personal use

66
New cards

VDI (Virtual Desktop Infrastructure)

Technology that allows OS and apps to be hosted and delivered to end-user devices over a network

67
New cards

DNS Sinkhole

Manipulating DNS responses to redirect traffic from malicious domains to a non-existent or controlled destination

68
New cards

Dump

The process of capturing the contents inside of a computer’s RAM at a specific moment

69
New cards

POST (Power-On Self Test)

Tests performed by a computer system to verify hardware components are functioning properly during start-up

70
New cards

Kerberos

A network authentication protocol that provides secure authentication for client-server applications over an untrusted network, helps prevent eavesdropping, replay attacks, and unauthorized access

71
New cards

HSM (Hardware Security Module)

Tamper-resistant hardware device designed for secure key management, used to safeguard sensitive information like cryptography keys, certificates, and other critical data

72
New cards

Screened subnet or DMZ

A network architecture design that separates the internal network from the internet (like a network air gap)

73
New cards

VPN concentrator or VPN gateway

Networking device that enables secure remote access to a private network over the internet

74
New cards

IMAP (Internet Message Access Protocol)

Email retrieval protocol that allows clients to manage emails stored on the mail server

75
New cards

S/MIME

A standard for securing email messages with encryption and digital signatures

76
New cards

Data Custodian

A team or individual responsible for the storage, management, and protection of data

77
New cards

ALE (Annualized Loss Expectancy)

The expected financial impact of a specific risk over one year

78
New cards

SLE (Single Loss Expectancy)

The expected loss of revenue from a specific risk

79
New cards

ARO (Annualized Rate of Occurrence)

The frequency of the specific event occurring within a one-year period

80
New cards

Containerization

a type of virtualization in which all the components of an application are bundled into a single container image and can be run in isolated user space on the same shared operating system

81
New cards

Normalization

organizes data within a database, allowing it to run smoother

82
New cards

One Time Password

an algorithm that generates a one time password

83
New cards

CER

the overall accuracy of the biometric system

84
New cards

curl

command line tool that is used for making HTTP requests and interacting with web servers, can be used to download files, send data to web servers, and test APIs.

85
New cards

head

command used to display the first few lines of a file or beginning of a stream

86
New cards

tracert

command that is used to trace the route a packet takes from the source device to the destination device

87
New cards

netstat

command used to view active network connections, listening ports,

88
New cards

routing tables

89
New cards

netcat

command that is used to establish and interact with network connections, can be used for data transmission, port scanning, file transfer, and testing

90
New cards

digg

command used for querying DNS servers to get information about domain names, IP addresses, and more.

91
New cards

pathping

combines the features of ping and tracert

92
New cards

hping

used for security auditing and testing of firewalls and networks

93
New cards

chmod

sets permissions of file or directories

94
New cards

STP frame (Spanning Tree Protocol

a network protocol used to prevent loops in Ethernet networks

95
New cards

MTU (Maximum Transmission Unit);;

the maximum size of a data packet that can be transmitted over a network protocol without fragmentation

96
New cards

BPDU (Bridge Protocol Data Unit);;

unit of communication in STP protocol

97
New cards

Jump server;;

a dedicated system used as an access point for connecting and managing other systems in a network

98
New cards

NAT (Network Address Translation);;

process for translating IP address between different network domains, Layer 3, used to overcome IPv4 limitations by allowing multiple devices with private IP address to share a single public IP address

99
New cards

Geofencing;;

technology that allows the creation of virtual boundaries around realworld geographic areas

100
New cards

OTG (On-the-go);;

enables direct USB connection between devices