Network Security and Cybersecurity Principles: 802.1X, ACLs, and Threat Detection

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/654

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

655 Terms

1
New cards

802.1X

The IEEE standard that defines port-based security for network access control.

2
New cards

Acceptable use policy (AUP)

A document that provides network and system users with clear direction on permissible uses of information resources.

3
New cards

Access badges

Used for entry access via magnetic stripe and radio frequency ID (RFID) access systems and when including a picture, allow personnel to determine if the person is who they say they are, what areas or access they should have, and if they are an employee or a guest.

4
New cards

Access control list (ACL)

Rule that either permits or denies actions.

5
New cards

Access control standards

Describes the account life cycle from provisioning through active use and decommissioning.

6
New cards

Access restrictions

Security measures that limit the ability of individuals or systems to access sensitive information or resources.

7
New cards

Account lockout

Accounts are often locked out after failed login attempts. Since brute-force attacks often rely on multiple attempts to log in, this may be an indicator of compromise.

8
New cards

Acknowledgment

Ensuring that employees and business partners state that they are aware of the compliance requirements.

9
New cards

Active/active load balancer

A kind of load balancer that distributes the load among multiple systems that are online and in use at the same time.

10
New cards

Active/passive load balancer

A kind of load balancer that brings backup or secondary systems online when an active system is removed or fails to respond properly to a health check.

11
New cards

Active reconnaissance

A technique that directly engages the target in intelligence gathering.

12
New cards

Ad hoc reports

Reports that are produced as needed, typically in response to specific events or situations that require immediate attention or in-depth analysis.

13
New cards

Ad hoc risk assessment

Conducted in response to a specific event or situation, often performed quickly, to address a particular concern or set of circumstances.

14
New cards

Adaptive identity

Often called adaptive authentication, it leverages context-based authentication that considers data points like where the user is logging in from, what device they are logging in from, and whether the device meets security and configuration requirements.

15
New cards

Address resolution protocol (ARP)

A protocol that provides translations between MAC addresses and IP addresses on a local network.

16
New cards

Admissibility

Determination as to whether evidence is acceptable to be used in a court of law.

17
New cards

Advanced persistent threats (APTs)

Cybersecurity adversary characterized by a sophisticated series of related attacks taking place over an extended period of time.

18
New cards

Adversarial artificial intelligence (AI)

The use of artificial intelligence techniques by attackers for malicious purposes.

19
New cards

Adversary tactics, techniques, and procedures (TTPs)

The study of the methods used by cybersecurity adversaries when engaging in attacks.

20
New cards

Agents

Software that is deployed to endpoints allowing them to perform actions or to be controlled by a central server or service.

21
New cards

Agent-based scanning

The use of software agents installed on target devices to assist with vulnerability scans.

22
New cards

Agile

A software development model that is both iterative and incremental. The Agile methodology focuses on individuals and interactions over process and tools, working software over comprehensive documentation, customer collaboration over negotiation, and responding to change rather than following a plan.

23
New cards

Agility

The speed to provision cloud resources and the ability to use them for short periods of time.

24
New cards

Air gapped

A design that physically separates network segments, preventing network connectivity between those segments.

25
New cards

Algorithm

A set of rules, usually mathematical, that dictates how enciphering and deciphering processes are to take place.

26
New cards

Allow listing

The most effective form of input validation in which the developer describes the exact type of input that is expected from the user and then verifies that the input matches that specification before passing the input to other processes or servers.

27
New cards

Alteration

The unauthorized modification of information and a violation of the principle of integrity.

28
New cards

Amplified denial-of-service attacks

An amplified denial-of-service attack takes advantage of protocols that allow a small query to return large results like a DNS query.

29
New cards

Annualized loss expectancy (ALE)

The possible yearly cost of all instances of a specific realized threat against a specific asset. The ALE is calculated using the formula ALE = single loss expectancy (SLE) * annualized rate of occurrence (ARO).

30
New cards

Annualized rate of occurrence (ARO)

The expected frequency that a specific threat or risk will occur (in other words, become realized) within a single year. Also known as probability determination.

31
New cards

Anomalous behavior recognition

Employees should be able to recognize when risky, unexpected, and/or unintentional behavior takes place.

32
New cards

Anomaly detection

A method of detecting abnormal or malicious events by looking for abnormal occurrences or violations of specified rules.

33
New cards

API

See application programming interfaces.

34
New cards

API-based CASB solution

Cloud Access Security Broker solutions do not interact directly with the user but rather interact directly with the cloud provider through the provider's API.

35
New cards

API inspection

A technology that scrutinizes API requests for security issues.

36
New cards

Application programming interfaces (APIs)

APIs allow application developers to interact directly with a web service through function calls.

37
New cards

Assessment

Reviews of security controls that are typically requested by the security organization itself in an effort to engage in process improvement.

38
New cards

Asset criticality

Determination of the importance of an asset to the business.

39
New cards

Asset inventory

Systematic method of tracking hardware, software, and information assets owned by an organization.

40
New cards

Asset management

A process that the organization will follow for accepting new assets (such as computers and mobile devices) into inventory, tracking those assets over their lifetime, and properly disposing of them at the end of their useful life.

41
New cards

Asset value (AV)

A dollar value assigned to an asset based on actual cost and nonmonetary expenses.

42
New cards

Asymmetric key algorithms

Cryptographic algorithms that use two different keys: one key to encrypt and another to decrypt. Also called public key cryptography.

43
New cards

ATT&CK

A public knowledge base describing adversarial techniques and tactics maintained by MITRE.

44
New cards

Attack complexity metric (AC)

A metric that describes the difficulty of exploiting a vulnerability.

45
New cards

Attack surface

A system, application, or service that contains a vulnerability that might be exploited.

46
New cards

Attack vector metric (AV)

A metric that describes how an attacker would exploit a vulnerability.

47
New cards

Attestation

A primary outcome of an audit by an auditor. It is a formal statement that the auditors have reviewed the controls and found that they are both adequate to meet the control objectives and working properly.

48
New cards

Attribute-based access control (ABAC)

An advanced implementation of a rule-based access control model that uses policies that include multiple attributes for rules.

49
New cards

Auditability

Cloud computing contracts should include language guaranteeing the right of the customer to audit cloud service providers.

50
New cards

Audits

Formal reviews of an organization's security program or specific compliance issues conducted on behalf of a third party.

51
New cards

Authentication

Verifies the claimed identity of system users and is a major function of cryptosystems.

52
New cards

Authentication header (AH)

Uses hashing and a shared secret key to ensure integrity of data and validates senders by authenticating the IP packets that are sent.

53
New cards

Authority

A key principle that relies on the fact that most people will obey someone who appears to be in charge or knowledgeable, whether or not they actually are.

54
New cards

Authorized attackers

Hackers who act with authorization and seek to discover security vulnerabilities with the intent of correcting them.

55
New cards

Availability

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

56
New cards

Availability metric (A)

A metric that describes the type of disruption that might occur if an attacker successfully exploits a vulnerability.

57
New cards

Backdoors

An opening left in a program application (usually by the developer) that allows additional access to data.

58
New cards

Background check

A process designed to uncover any criminal activity or other past behavior that may indicate that a potential employee poses an undetected risk to the organization.

59
New cards

Badges

Forms of physical identification and/or of electronic access control devices.

60
New cards

Bare-metal hypervisor

See Type I hypervisor.

61
New cards

BC-DR

See business continuity and disaster recovery.

62
New cards

Behavior-based detection

An intrusion discovery mechanism used by intrusion detection systems (IDSs) that detects abnormal and possible malicious activities by learning normal activities.

63
New cards

BIA

See business impact analysis.

64
New cards

Biometrics

Widely available on modern devices, with fingerprints and facial recognition being the most broadly adopted and deployed.

65
New cards

Birthday attack

An attack on cryptographic hashes, based on the birthday theorem.

66
New cards

Blackmail attacks

Attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks.

67
New cards

Blind content-based SQL injection

The perpetrator sends input to the web application that tests whether the application is interpreting injected code before attempting to carry out an attack.

68
New cards

Blind SQL injection

A kind of SQL injection attack that is conducted when the attacker doesn't have the ability to view the results directly.

69
New cards

Blind timing-based SQL injection

Penetration testers may use the amount of time required to process a query as a channel for retrieving information from a database.

70
New cards

Block ciphers

Operate on 'chunks' or blocks of a message and apply the encryption algorithm to an entire message block at the same time.

71
New cards

Block storage

Allocates large volumes of storage for use by virtual server instance(s).

72
New cards

Blockchain

A distributed and immutable open public ledger that prevents tampering with records stored among many different systems.

73
New cards

Bluejacking

Hijacking a Bluetooth connection to eavesdrop or extract information from devices.

74
New cards

Bluesnarfing

An attack that allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them.

75
New cards

Blue team

Defenders who must secure systems and networks from attack.

76
New cards

Bluetooth

A wireless standard commonly used to pair accessories to mobile phones or computers.

77
New cards

Board of directors

Has ultimate authority over the organization as the owners' representatives.

78
New cards

Bollards

Posts or other obstacles that prevent vehicles from moving through an area.

79
New cards

Bot

An automated software program (network robot) that collects information on the web; in its malicious form, it is a compromised computer being controlled remotely.

80
New cards

BPA

See business partners agreement.

81
New cards

BPDU

See bridge protocol data unit.

82
New cards

Brand impersonation

A type of phishing attack that uses emails intended to appear to be from a legitimate brand.

83
New cards

Bridge Protocol Data Unit (BPDU) guard

A switch security feature that blocks Spanning Tree Protocol (STP) attacks by preventing updates from unauthorized ports.

84
New cards

Bring your own device (BYOD)

The user brings their own personally owned device.

85
New cards

Broadcast storm

A flood of unwanted broadcast network traffic.

86
New cards

Brute-force attacks

A type of attack that systematically tries all possibilities for a password until achieving a successful result.

87
New cards

Buffer overflow

A type of denial-of-service (DoS) attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it.

88
New cards

Bursting

Leveraging public cloud capacity when demand exceeds the capacity of private cloud infrastructure.

89
New cards

Business constraints

In terms of vulnerability, they may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.

90
New cards

Business continuity and disaster recovery

Outline the procedures and strategies to ensure that essential business functions continue to operate during and after a disaster, and that data and assets are recovered and protected.

91
New cards

Business email compromise (BEC)

Relies on using apparently legitimate email addresses to conduct scams and other attacks.

92
New cards

Business impact analysis (BIA)

A formal process designed to identify the mission-essential functions within an organization and facilitate the identification of the critical systems that support those functions.

93
New cards

Business partners agreement (BPA)

Exists when two organizations agree to do business with each other in a partnership.

94
New cards

CA

See certificate authority.

95
New cards

CAM table

Maps MAC addresses to IP addresses, allowing a switch to send traffic to the correct port.

96
New cards

Capture the flag (CTF)

An exercise that pits technologists against one another in an attempt to attack a system and achieve a specific goal, such as stealing a sensitive file.

97
New cards

Card cloning attack

A kind of attack that focuses on capturing information from cards like RFID and magstripe cards often used for entry access.

98
New cards

Carrier unlocking

Allows mobile phones to be used with other cellular providers.

99
New cards

CASB

See cloud access security broker.

100
New cards

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

Encryption technology used in the WPA2 protocol. It implements AES (Advanced Encryption Standard) with a 128-bit key as a stream cipher.