1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Simple Network Management Protocol (SNMP)
protocol used to collect info about devices on a network and change their settings to manage how they work.
Granular
precise level of control applied to access permissions, policies, or monitoring.
Management Information Base (MIB)?
A database that tells SNMP tools what data to collect, how it's organized, and how to interpret it.
verbose
setting in tools and logs that provides descriptive output, often used for troubleshooting or analysis
security content automation protocol (SCAP)
rules that help computers Check for vulnerabilities, Measure security settings, & stay compliant with government or industry standards
Open Vulnerability Assessment Language (OVAL)
XML-based standard used to describe the security state of computer systems
Extensible Configuration Checklist Description Format (XCCDF):
XML format for defining, managing, and testing security checklists and configuration rules.
Asset Reporting Format (ARF)
sharing info about IT assets and their security status.
Common Configuration Enumeration (CCE)
Gives unique IDs to specific security configuration issues on systems.
Common Platform Enumeration (CPE)
Standard naming system for software, operating systems, and hardware platforms.
Common Vulnerabilities and Exposures (CVE)
digital “wanted list” that gives each known cyber threat its own ID
Common Vulnerability Scoring System (CVSS)
It’s a system that gives each cyber weakness a score to show how serious or dangerous it is
Benchmark
best practices used to measure and evaluate how well a system performing in security
Full Packet Capture (FPC)
means recording all the data packets that pass through a network
flow analysis
studying the patterns of data moving across a network
NetFlow
tool that collects and records information about network traffic flows.
IP Flow Information Export (IPFIX)
defines and exports traffic flows by grouping packets with shared characteristics
Zeek
network security monitoring tool that analyzes network traffic in real time to detect suspicious behavior
Multi Router Traffic Grapher (MRTG)
is a tool that monitors and graphs the traffic load on network devices,
Single pane of glass
central point of access of all information, tools, and systems