1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
SCAP (Security Content Automation Protocol)
framework to automate vulnerability management and compliance reporting
Benchmarks
standard guidelines for configuring systems securely and consistently
Agent
a software program installed on a system that collects data, monitors activity, or enforces security policies
Agentless
a method of monitoring or scanning systems without installing software, typically by accessing data remotely
Agentless Checks
remotely checks systems without installing agents
Log Aggregation
collecting logs from multiple sources into one place
Long-Term Storage
keeping logs/events for a long time for compliance or investigation
Data Correlation
connecting data from multiple sources to find patterns or threats
Forensic Analysis
analyzing logs/data to investigate security incidents
DLP (Data Loss Prevention)
a strategy to stop sensitive data from leaving an organization's control by identifying, monitoring, and protecting it
SNMP (Simple Network Management Protocol)
an application-layer protocol used to monitor and manage IP network devices like routers, switches, servers, and printers from a central management system
MIB (Management Information Base)
database for managing network devices via SNMP
OIDs (Object Identifiers)
unique numerical strings used to identify specific MIB objects for SNMP management and monitoring
UDP/161
port number used for SNMP communications, allowing devices to send and receive management data.
SNMP traps
an asynchronous notification sent from a managed device (Agent) to a management station (Manager) to report an immediate, critical event
NetFlow
a standard protocol for collecting IP traffic metadata (not the content itself) on a router or switch
Probe and Collector
watches network communication & gets summary records that are then sent to the collector
Vulnerability Scanners
automated software that scans systems against a CVE database to identify known security flaws (vulnerabilities, misconfigurations, or missing patches)