Book 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

privacy

These are rules and tools that protect personal information — like your name, address, or credit card number — from being seen, shared, or used without your permission.

2
New cards

security controls

These are measures that protect systems and data from threats like hackers, viruses, or unauthorized access. They keep your devices and networks safe from attacks.

3
New cards

nist sp 800-30

A special publication that provides guidelines for conducting risk assessments in information systems. It outlines a systematic approach to evaluating risks and recommending suitable security controls.

4
New cards

Adversarial threats (nist)

are potential dangers posed by malicious actors who aim to exploit vulnerabilities in information systems. These threats include hackers, insider threats, and cybercriminals.

5
New cards

accidental threats (nist)

occur when unintended actions lead to security incidents, such as human errors, system failures, or natural disasters. These threats can compromise the integrity and availability of information systems.

6
New cards

structural threats (nist)

represent risks that arise from flaws in system design, architecture, or implementation. These can lead to vulnerabilities that malicious actors may exploit to breach systems.

7
New cards

environmental threats (nist)

refer to risks caused by external factors such as natural disasters, climate change, or other environmental conditions that can impact the security and functionality of information systems.

8
New cards

during the threat identification phase do cs analsysts focus on internal or external factors

external factors then afterwards they focus the assessment inwards

9
New cards

what factors should analysts consider when determining the likelihood of a risk occurring

the likelihood that the adversary will execute an attack against the organization and if the risk occurs the potential impact of that attack

10
New cards

what do NAC help with

limiting network access to authorized individuals and ensuring that systems accessing the organizations network meet basic security requirements

11
New cards

802.1x

standard used to control device access to a network, often part of NAC (Network Access Control).

12
New cards

trigger

When a device connects (wired or wireless), the network challenges it to authenticate using 802.1X.

13
New cards

supplicant

a software on the device trying to connect, responsible for handling authentication

14
New cards

authenticator

a network device such as a switch or wireless access point that receives the request from the supplicant

15
New cards

authenticator server

the backend server (usually radius) that validates the user’s credentials

16
New cards

agent based solutions

require that the network device requesting access to the network run special software designed to communicate with the NAC service.

17
New cards

agentless

conducts authentication in the web browser and does not require special software

18
New cards

in band (inline) solutions

utilize network appliances within the data path to enforce security policies and access control as traffic flows through.

19
New cards

out of band

leverage the existing network infrastructure and have network devices communicate with authentication servers and then reconfigure the network to grant or deny network access as needed

20
New cards

where do network firewalls sit

between the boundaries of networks and provide perimeter security.

21
New cards

screened subnet

a network architecture that uses firewalls to separate an internal network from an external network, enhancing security by controlling access.

22
New cards

what are firewall rules based off of

Access control lists that specify allowed or denied traffic based on various criteria such as IP address, port number, and protocol.

23
New cards

packet filtering firewalls

check the characteristics of each packet against the firewall rules without any additional intelligence to determine whether to allow or block it. They are efficient but can be limited in terms of security features.

24
New cards

stateful inspection firewalls

type of network security system that keeps track of active connections (or "states") as data passes through it.

25
New cards

next generation firewalls

incorporate advanced features such as deep packet inspection, intrusion prevention systems, and application awareness to provide enhanced security beyond traditional firewalls.

26
New cards

Web application firewalls

specialized firewalls designed to protect against web application attacks such as SQL and cross site scripting

27
New cards

what do firewalls use to separate networks of different security levels from each other

network segmentation

28
New cards

DNS sinkhole

a security measure that redirects malicious traffic from a domain to a safe IP address, preventing access to harmful sites.

29
New cards

MAC

offers strict, centralized policies ideal for high-security environments like government and military systems

30
New cards

DAC

provides flexibility, allowing resource owners to manage access, making it better for businesses and collaborative environments.

31
New cards

during what phase does the technical work of a penetration test begin

discovery phase

32
New cards

sandboxing

an approach used to detect malicious software based on it’s behavior rather than it’s signatures. They watch systems and the network for unknown pieces of code in a special environment where it does not have access to other systems or applications

33
New cards

code detonation

is a technique used in cybersecurity to analyze potentially malicious code by executing it in a controlled environment, or 'sandbox', to observe its behavior without affecting live systems.

34
New cards

SHA

A tool that creates a unique fixed-length code (called a hash) from any data, used to verify that the data has not been changed or tampered with.

35
New cards

single pane of glass

A dashboard or interface that shows all important information in one place, so you don’t have to check multiple tools or screens.

36
New cards

soar

A tool or platform that helps security teams automate their work, connect different tools, and respond to threats faster.