Module 2 Quiz | Information Security ITEC 3300

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/109

flashcard set

Earn XP

Description and Tags

ape together strong

Last updated 12:37 AM on 2/9/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

110 Terms

1
New cards

Red Team

a pen testing team that scans for vulnerabilities and then exploits them

2
New cards

Bug Bounty

monetary rewards given for uncovering a software vulnerability.

They allow organizations to identify/remediate vulnerabilities before the public is aware of it, reducing the spread and intensity of the abuse

3
New cards

Penetration Testing

a type of test that attempts to exploit vulnerabilities just as a threat actor would

4
New cards

White Team

a pen testing team that enforces the rules of the pen testing

5
New cards

Purple Team

a pen testing team that provides real time feedback between the Red and Blue teams to enhance the testing

6
New cards

Blue Team

a pen testing team that monitors for the Red Team attacks and shores up defenses as necessary

7
New cards

Gray Box

a pen testing level in which the testers are given LIMITED knowledge of the network and some elevated privileges

8
New cards

Black Box

a pen testing level in which the testers have NO KNOWLEDGE of the network and no special privileges.

This is the most accurate simulation of what a real threat actor would do.

9
New cards

White Box

a pen testing level in which testers are given FULL KNOWLEDGE of the network and the source code of the applications

10
New cards

Rules of Engagement

limitations or parameters in a pen test. without them, a pen test can easily veer off course

11
New cards

Cleanup

returning all systems back to normal following a penetration test

12
New cards

Footprinting

gathering information from outside the organization

13
New cards

War Driving

searching for wireless signals from an automobile or on foot while using a portable computing device

14
New cards

Persistence

a process in which a load balancer creates a link between an endpoint and a specific network server for the duration of the session.

Refers to the maintenance of access for a prolong period of time without being identified.

15
New cards

War Flying

similar to war driving, an efficient means of discovering Wi-Fi signal using drones

16
New cards

Drones

An unmanned aerial vehicle (UAV) without a human pilot on board to control its flight.

17
New cards

Passive Reconnaissance

searching online for publicly accessible information. the tester does not engage or interact with the system.

18
New cards

What does UAV stand for?

unmanned aerial vehicle

19
New cards

Open Source Intelligence (OSINT)

publicly accessible information

20
New cards

Privilege Escalation

moving to more advanced resources that are normally protected from an application user

21
New cards

Lateral Movement

gradually moving through/gaining access a network looking for additional systems threat actors can access from their elevated position

22
New cards

Pivoting

refers to attacking or taking control of a system through another compromised system.

The compromised system is often a trusted system that belongs to the same network.

23
New cards

Vulnerability Scan

A frequent and ongoing process, often automated, that continuously identifies vulnerabilities and monitors cybersecurity progress.

24
New cards

Non-Credentialed Scan

a vulnerability scan that provides no authentication information to the tester

25
New cards

Credentialed Scan

A scan where valid authentication credentials (usernames and passwords) are supplied to the vulnerability scanner to mimic the work of a threat actor who possesses these credentials

26
New cards

Intrusive Scan

A vulnerability scan that attempts to employ any vulnerabilities which it finds, much like a threat actor would

27
New cards

Configuration Review

An examination of the software settings for a vulnerability scan

28
New cards

Non-intrusive Scan

a vulnerability scan that doesn’t attempt to exploit the vulnerability and instead only records that it was discovered

29
New cards

Log

a record of events that occur

30
New cards

False Negative

failure to raise an alarm when there is a problem

31
New cards

Common Vulnerabilities and Exposures (CVE)

a tool that identifies vulnerabilities in operating systems and application software

32
New cards

Common Vulnerability Scoring System (CVSS)

a numeric rating system of the impact of a vulnerability

33
New cards

False Positive

raising an alarm when there’s no problem

34
New cards

Log Reviews

the analysis of log data

35
New cards

User Behavior Analysis

looking at the normal behavior of users and how they interact with systems to create a picture of typical activity

36
New cards

Sentiment Analysis

the process of computationally identifying and categorizing opinions in order to determine the writer’s attitude towards a particular topic

37
New cards

Security Information and Event Management (SIEM)

a tool that consolidates real time security monitoring and management of security information with analysis and reporting of security events.

38
New cards

Security Orchestration, Automation, and Response (SOAR)

a tool designed to help security teams manage and respond to the very high number of security warnings by combining comprehensive data gathering/analytics in order to automate incident response

39
New cards

Maneuvering

conducting unusual behavior when threat hunting

40
New cards

Threat Feeds

cybersecurity data feeds that provide information on the latest threats

41
New cards

Fusion Center

a formal repository of information from enterprises and the government used to share information on the latest attacks

42
New cards

Threat Hunting

proactively searching for cyber threats that thus far have gone undetected in a network

43
New cards

Framework

a series of documented processes used to define policies and procedures for implementation and management of security controls in an enterprise environment

44
New cards

ISO 27002

a “code of practice” for information security management within an organization and contains 114 different control recommendations

45
New cards

NIST Risk Management Framework (RMF)

a guidance document designed to help organizations assess and manage risks to their information and systems

46
New cards

ISO 27001

a standard that provides requirements for an information security management system (ISMS)

47
New cards

NIST Cybersecurity Framework (CSF)

a measuring stick against which companies can compare their cybersecurity practices relative tot he threats they face

48
New cards

ISO 27701

an extension to ISO 27001 and is a framework for managing privacy controls to reduce the risk of privacy breaches

49
New cards

ISO 31000

a standard that contains controls for managing and controlling risk

50
New cards

SSAE SOC 2 Type II

a standard for reports on internal controls report that reviews how a company safeguards customer data and how well those controls are operating

51
New cards

SSAE SOC 2 Type III

a standard for reports on internal controls that can be freely distributed

52
New cards

Center for Internet Security (CIS)

a nonprofit community-driven organization that publishes a set of prioritized security controls which provide a framework for organizations to improve their overall cybersecurity posture

53
New cards

Reference Architecture

an authoritative source of information / a document that outlines recommended ways to integrate IT products and services to create a secure solution

54
New cards

Cloud Controls Matrix

a specialized framework for cloud-specific security controls

55
New cards

Cloud Security Alliance (CSA)

an organization whose goal is to define and raise awareness of best practices to help secure cloud computing environments

56
New cards

Regulations

standards typically developed by established professional organizations or government agencies using the expertise of seasoned security professionals

57
New cards

Payment Card Industry Data Security Standard (PCI DSS)

a compliance standard to provide a minimum degree of security for handling customer card information

58
New cards

Benchmark/Secure Configuration Guides

guidelines for configuring a device or software usually distributed by hardware manufacturers and software developers

59
New cards

European Union General Data Protection Directive (GDPR)

a regulation regarding data protection and privacy in the European Union and the European Economic Area (EEA)

60
New cards

Standard

a document approved through consensus by a recognized standardization body

61
New cards

Platform/Vendor-Specific Guides

guidelines that only apply to specific products

62
New cards

Adversary Tactics, Techniques, and Procedures (TTP)

a database of the behavior of threat actors and how they orchestrate and manage attacks

63
New cards

Requests for Comments (RFCs)

documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas

64
New cards

Vulnerability Feeds

cybersecurity data feeds include that provide information on the latest vulnerabilities

65
New cards

What are the four A’s?

  • Availability

  • Authentication

  • Authorization

  • Accountability

66
New cards

Availability

defined by FISMA as ensuring reliable access to and use of information upon demand by an authorized person

67
New cards

Authentication

the process of verifying identity of user, process, or device

(think of this as your drivers license)

68
New cards

Authorization

the process of giving someone the ability to access a resource

69
New cards

Accountability

the property of being able to TRACE activities on a system to individuals who may be held responsible for their actions

70
New cards

Anti-Accountability

  • Logs erased

  • Ethics ignored

  • No enforcements

  • No training

71
New cards

Cybercrime

defined as a crime where a computer is the object of the crime/is used as the tool to commit the offense

72
New cards

Cyber Kill Chain

a model outlining the various phases of common cyber hackers

<p>a model outlining the various phases of common cyber hackers</p>
73
New cards

Zerodium

a company that buys bug information and sells it to government organizations who need specific and tailored solutions to defend against zero-day attacks

74
New cards

Threat Management

securing an organization from attacks. the goal is to take the appropriate steps needed to minimize hostile cyber actions.

75
New cards

Kali Linux

a linux distribution that is a popular penetration testing tool

76
New cards

Creep

an expansion beyond the initial set of the pen tests limitations

77
New cards

Can a penetration test occur without a planning stage?

No pen test should occur without a detailed planning phase

78
New cards

Deep Vulnerabilities

vulnerabilities that are found in penetration testing that are only exposed through actual attacks that use the mindset of a threat actor

79
New cards

Should an organization without a solid cybersecurity defense conduct a penetration test as a first step?

No. A general scan should first be conducted to reveal and address surface vulnerabilities. After that, a more thorough pen test can be performed

80
New cards

Internal Security Personnel

employees who already work within an organization

81
New cards

Advantages of using Internal Security Personnel to conduct a pen test

  • little to no additional cost

  • tests can be conducted more quickly

  • in house pen tests can be used to enhance employee training and raise security awareness

82
New cards

Disadvantages of Internal Security Personnel

  • inside knowledge

  • lack of expertise

  • reluctance to reveal

83
New cards

External Pen Tester Consultants

contracting external third-party pen testing consultants, usually hired by a company that focuses on pen testing.

84
New cards

Advantages of External Consultants

  • expertise

  • credentials

  • experience

  • focus

85
New cards

Disadvantages of External Consultants

  • a contractor would learn about an organizations network and receive extremely sensitive information about them

  • knowledge gained could be sold to a competitor by an unscrupulous employee of the third-party contractor

86
New cards

Advantages of Crowdsourced Pen Testing

  • faster testing

  • ability to rotate teams

  • option of conducting multiple tests simultaneously

87
New cards

Timing Phase

phase of rules of engagement where the timing parameter is set, determining the date and time that testing will occur and if the testing will occur during active business hours

88
New cards

Scope

element of rules of engagement that determines WHAT should be tested and defines the relevant boundaries (targets and environments)

89
New cards

Coalfire

a penetration testing company that had two contractors arrested because they failed to properly communicate that a pen test was occurring

90
New cards

Authorization

the receipt of prior written approval to conduct the pen test. a formal document MUST be signed by all parties before a pen test begins

91
New cards

Exploitation

part of the scope that asks how MUCH pen testers can view and whether or not vulnerabilities found should be exploited or just disclosed

92
New cards

Initiation

organizations must be notified that the pen testing process has begun. DO NOT proceed with pen test without notifying organization

93
New cards

Incident Response

if a pen tester can complete the initial vulnerability assessment without triggering the organizations incident response mechanism, then a critical gap in security has been identified.

94
New cards

Status

provide periodic updates to the organization management instead of waiting until the test is complete.

95
New cards

Emergency

if the pen tester uncovers a critical vulnerability it should be immediately reported to the organizations management while the pen test is paused

96
New cards

Cleanup

following the exploitation of the systems, the pen tester must ensure that everything related to the pen test has been REMOVED

97
New cards

Reporting

once a pen test is complete, a report should be generated to document its objectives, methods used, and results. divided into two parts, executive and technical summary

98
New cards

Executive Summary

a summary designed for a less technical audience–namely those who are in charge of oversight and strategic vision of the security program

Identify overall risk and a breakdown of vulnerabilities exploited

99
New cards

Technical Summary

the second part of the report that is technical in nature and written for security professionals.

100
New cards

Enumeration

performing port scans and resource identification methods

Explore top notes

note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)
note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)

Explore top flashcards

flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)
flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)