Cyber Security + CompTIA Doman 1

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 68

flashcard set

Earn XP

Description and Tags

All the related info for the Domain 1 of the Cyber Security + CompTIA

69 Terms

1

Physical Attacks Examples

  • Tailgating

  • Shoulder Surfing

  • Dumpster diving

    • Target individual

  • Ear Dropping

  • Physical Smart cards

  • Malicious USB devices

New cards
2

Eliciting Information

  • Casual Conversating

  • Talking about ourselves.

  • Offering Advice.

  • Disagreement

  • Provocative statements.

  • Bracket

    • make vague statement

  • flattery

  • False Statement

  • Artificial Ignorance

  • Complaining

New cards
3

Phising

Give up personal info

New cards
4

Spear Phishing

Target Specific groups with Phishing

New cards
5

Whaling

Target top executives

New cards
6

Vishing

phishing over voice messages

New cards
7

Smishing

phishing over text

New cards
8

Spam

unsolicited email. aka irritant

New cards
9

Spim

Spam over messaging

New cards
10

Attract Vectors

Methods of attack

New cards
11

Example of Attract Vectors

Direct Access, Wireless, Emails, Supply Chain, Social Media, Cloud

New cards
12

Social Engineering Attacks

2 types, Physical Attacks | Virtual Attacks

New cards
13

Physical Attacks in Social Engineering

Tailgating, Shoulder Surfing, Dumpster diving, Eliciting Information

New cards
14

Virtual Attacks in Social Engineering

Phishing, Spear Phishing, Whaling, Vishing, Hoax, Watering Whole Attack

New cards
15

Hoax

intent is to frighten and mislead recipients and get them to do something with fear

New cards
16

watering whole attacks

Targets groups of users by infecting websites that they commonly visit

New cards
17

pharming

online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.

New cards
18

Shadow IT

good intended actions like using tool to make you job efficient but it will turn out bad cause it is not in the policies

New cards
19

Threat Intelligence Sources: Cyber-threat intelligence gathering examples

Open-Source Intelligence (OSINT)

Closed/proprietary

Vulnerability Databases

Public/Private info sharing

Dark Web

Indicators of compromise

Automated Indicators Sharing (AIS)

Structured Threat Information Expression(STIX)/Trusted Automated Exchange of Intelligence Infor (Taxii)

Predictive ANalysis

THreat Maps

File/code Repositories

New cards
20

Open Source Intelligence (OPINT)

Cyber-threat intelligence gathering free of charge.

New cards
21

Closed/Proprietary

Vendor-Specific threat intelligence limited to paying customers

New cards
22

Vulnerability Database

sources that shows known vulnerabilities.

New cards
23

Public/Private Information Sharing Center

Any group that shares Cyber intelligence in various forms

New cards
24

Dark Web

So yeah. You know it.

New cards
25

Indicator of Compromises

Pieces of forensic Data

New cards
26

Automated Indicator Sharing(AIS)

allows organizations to share and access real-time cyber threat intelligence and threat information without revealing sensitive detail about their networks and systems.

New cards
27

Trusted Automated Exchange of Intel Info Taxii

Standard how AIS share via services/ message Exchange

New cards
28

STIX

using TAXII and define the APi for AIS aka language for TAXII

New cards
29

Predictive Analysis

to make data-driven decisions based on heuristics and patterns from previous events

New cards
30

Threat maps

real time map of the computer security attacks

New cards
31

File/code Repositories

Code share like GitHub

New cards
32

Vendor’s Website

Vendors keep track the Vulnera

New cards
33

Vulnerability feed

security operations by providing data about security vulnerabilities and related cyber threat intelligence to reduce cyber risks and streamline investigation and response.

New cards
34

Conference

Network with experts

New cards
35

Academic Journal

Paper bout Cyber Attacks

New cards
36

request for comments RFC

specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.

New cards
37

Local Groups

learn people from near you.

New cards
38

Threat Feed

Free/Paid delivery info about the important threats to you

New cards
39

TTP

Tactic, technique, procedures for hackers

New cards
40

Threat Hunting

Dynamic ways to find/hunt Cyber Threats inside of the network

New cards
41

Intelligence

Gov and industry gather’s, analyze and share info about threat of cyber kind

New cards
42

Threat Feed

Enables organi informed about indicators of compromise IOCs

New cards
43

Advisories/Bulletin

Gov/private share how to defend from cyber threats

New cards
44

Credential Scan

powerful and higher privilege's that a non credential scanner. Goal to find exploits that related to privilege's access

New cards
45

Non-Credentialed Scan

Scan for lower credentialed Scanner where attacker would easily find

New cards
46

Maneuver

org disguising its sys so hard to find them infor

New cards
47

Non-Intrusive Scan

Passive and merely Report vulnerabilities

New cards
48

Intrusive Scan

damageful cause it tries to exploit the vulnerability

New cards
49

Configuration Review

Config compliance Scanner

New cards
50

Network Scan

scan at computer/devices on yout network

New cards
51

Application Scanner

vulner for apps

New cards
52

Web App Scan

be like a search engine looking for vulera

New cards
53

Common Vulnera and Exposures CVS

list of publicly document disclosed vulnera

New cards
54

Common Vulnera Scoring System

over all score for the volunra

New cards
55

Secruity Infor Event Manager SIEM

a sys where all the collected data that real time monitor, analysis, correlations and notification of protentional attack

New cards
56

Security Orchesration Automation and Response

Centralized Aler/Responce automation with in specific threat by learning from ML AI and SIEM

New cards
57

SIEM functionalities

Log Collectors = collects info from syslog and servers

Log Aggregation = Correlate and aggregate events for future identifying attacks

Packer Capture = Packet capture and analysis in the local network

Data Inputs = Collects data from massive of data from various sources

User Entity Behavior Analysis = normal behaviors from a user

Sentiment Analysis = AI and ML to identify attacks

Security Monitoring = Real-time protection and event monitoring

Event Reporting = place that has all the essential for the function and report of event

New cards
58

AI

Does Smart Task combining ML and DL

New cards
59

ML

Subset of AI, algorithms that improves over time by experience and use of data

New cards
60

DL

Subfield of ML that function as Artificial Neural Networks

New cards
61

SOAR

de

New cards
62

Lateral movement

move to other devices after the initial access

New cards
63

pivoting

aka island hopping

New cards
64

Passive reconnaissance

Getting intel without interacting directly with target. Purpose is that target does not know being targeted

New cards
65

Passive Reconnaissance Examples

war driving

Drone

War flying

OSINT

New cards
66

Active Reconnaissance

get intel by directly interacting with target where target might notice for being target

New cards
67

Active Reconnaissance

ping Sweep

Tracert Analysis

Nmap

Extracting DNS info

New cards
68

Foot Printing

technique to gather info to use in for penetrations

New cards
69

Testing Teams

White team = judges

purple = process improvements by intermediary between blue and read teams

New cards
robot