1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Buffer Overflow
When an attacker sends more data to memory storage than it can handle, causing the program to overwrite adjacent memory.
Microservice Outages
Occurs when one independent component of a larger system fails.
Risk Register
A centralized document that lists all identified risks to an organization.
Risk Reporting
The process of communicating risk to stakeholders.
Replay Attack
When an attacker captures valid data transmissions (like session tokens) and resends them later, in hopes to tricking the system to grant them unauthorized access.
DDos (Distributed denial of service)
Flooding a service so that its so overwhelmed, real users can’t access it.
Incident Response Process (6 phases)
Preparation
Detection and Analysis
Containment
Eradication
Recovery
Lessons Learned
Lessons Learned
The post incident review that documents the incident, timeline, and improvements that can be made.
Race Condition
It’s a flaw when an attacker can sneakily get in and change the outcome because of timing. Think about the bank example and withdrawing/depositing money.
Capacity Planning
The process of forecasting and preparing for future resource needs
Honeynet
A system intentionally designed to look vulnerable to lure attackers and study their behavior
SCADA System (Supervisory Control and Data Acquisiton)
They are used to monitor and control physical infrastructure like power plants, pipelines, etc.
Hardening
Is a process of securing a system by reducing its attack surface.
Spraying
Brute force attack but the attacker tries common passwords across many accounts, instead of trying just one account.
Downgrade
An attack that forces a system to use an older, weaker version to exploit vulnerabilities.
Sideloading
Installing apps that are outside the official app store.
VLAN (Virtual Local Area Network)
Segments a physical network into separate logical networks
Compensating
A backup or alternative security measure
Directive Control Type
Guide or influence behavior through policies
Secure Enclave
A protected area of memory that isolates sensitive data and code execution
Shadow It
Refers to unauthorized hardware, software, used by employees who go around/over the IT department.
Cross-Site Scripting Attack
A code injection attack where an attacker injects malicious code into a trusted website, which is then executed in a victim’s browser.
Federation
A trust relationship between 2 or more orgs, that allows authentication across systems using a single identity.
Enumeration
Apart of the reconnaissance phase and its where you’re actively gathering information like usernames, system details etc. about a target system.
Key Stretching
A technique used to make passwords stronger by increasing the time it takes to brute-force them. Applying hashing millions of times.
Steganography
The practice of hiding data within other data.
SCAP (Security Control Automation Protocol)
A framework that defines a set of standards and automates security configuration management.
Keylogger
A type of spyware that records keystrokes on a keyboard to capture sensitive information.
RADIUS
Is a centralized protocol used to authenticate, authorize, and account for users connecting to a network.
RTOS
Real Time Operating System