Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
CMSC 426 Lecture 3
Studied by 0 people
0.0
(0)
Add a rating
View linked note
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 40
There's no tags or description
Looks like no one added any tags here yet for you.
41 Terms
View all (41)
Star these 41
1
Attacker
An individual, group, or entity attempting to compromise the confidentiality, integrity, and availability of information systems.
New cards
2
Types of attackers
Script Kiddies, Cybercriminals, Hacktivists, Advanced Persistent Threats (APTs).
New cards
3
APTs
Resource-rich threat actors that target long-term objectives, examples include APT1 and Sandworm.
New cards
4
Offensive security
A proactive approach to computer security involving red teaming and penetration testing.
New cards
5
Reconnaissance
The phase where attackers gather information using techniques such as OSINT and social engineering.
New cards
6
Weaponization & Development
Creating tailored payloads and determining target connection methods based on gathered intelligence.
New cards
7
Delivery methods
Techniques used to deliver payloads, including social engineering and phishing emails.
New cards
8
Initial Access, Exploitation, & Execution
Executing crafted code or malware on the target system.
New cards
9
Installation & Persistence
Installing additional malware to establish persistent access.
New cards
10
Command & Control
The stage where the compromised system communicates with the attacker's server.
New cards
11
Discovery, Escalation, & Lateral Movement
Gathering more information, escalating privileges, and compromising additional systems.
New cards
12
Actions on Objective
Completing the attacker’s mission such as data exfiltration or disruption.
New cards
13
Incident Response (IR)
The process of detecting and responding to cyber incidents to minimize damage.
New cards
14
Main phases of Incident Response
Detection, Response (Containment), Mitigation, Recovery, and Reporting.
New cards
15
Detection phase
Identifying suspicious activity through monitoring and logging.
New cards
16
Response (Containment) phase
Containing the incident to limit damage and isolate affected systems.
New cards
17
Mitigation phase
Analyzing the incident to determine its cause and securing systems against exploited vulnerabilities.
New cards
18
Recovery phase
Returning systems to a stable state post-incident.
New cards
19
Reporting phase
Documenting the incident and outlining lessons learned.
New cards
20
Antivirus Software (AV)
Software that detects, blocks, and removes malware through various methods.
New cards
21
Intrusion Detection System (IDS)
A system that monitors for signs of malicious activity and alerts administrators.
New cards
22
Difference between IDS and IPS
IDS detects and alerts, while IPS actively blocks threats.
New cards
23
Endpoint Detection and Response (EDR)
A security solution monitoring endpoint activities for threats.
New cards
24
Security Information and Event Management (SIEM)
Aggregates logs and alert data for centralized event management.
New cards
25
Indicators of Compromise (IOCs)
Artifacts left by attacks, such as malicious file hashes and IP addresses.
New cards
26
Tactics, Techniques, and Procedures (TTPs)
Methods and behaviors used by threat actors during attacks.
New cards
27
Entry Point in cybersecurity
The initial access vector through which attackers gain system access.
New cards
28
Difference between vulnerability and exploit
A vulnerability is a weakness; an exploit is a technique to take advantage of that weakness.
New cards
29
Command injection
An attack where unsanitized user input is passed to system commands.
New cards
30
Techniques used in command injection attacks
Appending commands using separators and piping outputs.
New cards
31
Defenses against command injection
Input validation, sanitization, escaping dangerous characters, whitelists.
New cards
32
SQL Injection attack
Inserting user input directly into an SQL query to manipulate databases.
New cards
33
Prevention strategies for SQL Injection
Input validation, sanitization, using stored procedures.
New cards
34
Cross-Site Scripting (XSS)
A vulnerability where attackers inject malicious JavaScript into websites.
New cards
35
Types of XSS attacks
Stored (persistent) XSS and reflected XSS.
New cards
36
Defenses against XSS
Secure input handling, sanitizing user input, Content Security Policies.
New cards
37
Basic structure of an HTTP request
Method, path, HTTP version, headers, and optional body.
New cards
38
Basic structure of an HTTP response
HTTP version, status code, headers, and response data.
New cards
39
Common HTTP methods
GET (retrieve data) and POST (send data).
New cards
40
Cookies in HTTP
Small data pieces stored in a user's browser for maintaining state.
New cards
41
Maintaining sessions using cookies
Server sends cookies that browsers return with subsequent requests.
New cards
Explore top notes
Chapter 1: Structure of the Atom
Note
Studied by 14 people
1005 days ago
4.0
(1)
Preview
🫡
Chapter 5: Shorter is Better
Note
Studied by 162 people
624 days ago
5.0
(1)
Preview
Geography Term 4
Note
Studied by 16 people
122 days ago
5.0
(1)
Preview
🌳
Chapter 19 - Plants
Note
Studied by 22 people
743 days ago
5.0
(1)
Preview
AP Vocab 4
Note
Studied by 61 people
882 days ago
4.0
(1)
Preview
Letter #24
Note
Studied by 8 people
176 days ago
5.0
(1)
Preview
Chapter 18 - Reconstruction
Note
Studied by 10 people
898 days ago
5.0
(1)
Preview
đź’Ą
PHRASAL VERBS
Note
Studied by 255 people
686 days ago
4.8
(9)
Preview
Explore top flashcards
Hiragana
Flashcard (127)
Studied by 31 people
911 days ago
5.0
(1)
Preview
medical imaging
Flashcard (20)
Studied by 19 people
266 days ago
5.0
(1)
Preview
Vocabulary List #14
Flashcard (20)
Studied by 8 people
784 days ago
5.0
(1)
Preview
chapter 5 spanish
Flashcard (28)
Studied by 29 people
737 days ago
5.0
(2)
Preview
EMS_ Term 3 & 4
Flashcard (67)
Studied by 9 people
837 days ago
5.0
(1)
Preview
Spanish 4 Honors Vocabulary Semester I
Flashcard (315)
Studied by 51 people
763 days ago
5.0
(4)
Preview
Midterm Martin and Ch. 7 Intercultural
Flashcard (29)
Studied by 15 people
379 days ago
5.0
(1)
Preview
G8 U9
Flashcard (26)
Studied by 84 people
17 days ago
5.0
(1)
Preview