.04 RG Vocab system security - linux Flashcards

1
Q

Source code

A

Programming code in text format compiled into software you can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GNU

A

Not UNIX; recognized as the start of the Open-Source Movement in 1983. GNU
software is included with the Linux kernel in the form of distribution or distros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Linux

A

Operating system kernel released in 1991 named after Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open source

A

Describes software that allows the end user to have access to the source
code and the freedom to change and implement that software based on a less restrictive
license than closed-source software. Examples: GNU Core Utilities, Linux, FreeBSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Closed source

A

Describes software that gives the end user little to no access to the source
code and limited freedom to change and implement that software based on a very restrictive
license compared to open-source licenses. Examples: Microsoft, UNIX, IBM z/OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux kernel

A

A foundational Linux component responsible for the low-level interface
between an operating system and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bootloader

A

Code run by a computer after it starts. The bootloader can then be pointed to
the Linux kernel on storage/disk to start the Linux kernel (i.e., bootstrapping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Drivers

A

Software that makes computer devices available for use by applications. File system
drivers “present” the filesystem to applications that save files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network

A

Allows applications to communicate from a computer to other computers over
wired (Ethernet) and wireless networks (IEEE 802.11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux Security Modules (LSM)

A

Primarily designed as enhanced access control
mechanisms called mandatory access control (MAC); includes AppArmor, SELinux, Smack,
and TOMOYO. Do not confuse this MAC with the layer 2 media access control addresses in
Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Processes, instances, and threads

A

Hardware resources and “time” to run (i.e., an
instance) allocated by an operating system when code is run. This process can perform
multiple activities, which are known as threads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sessions

A

Consists of a group of processes. When users log in, applications and services
(known as daemons) are instantiated and grouped into process groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tty, pty

A

Teletype and pseudo-teletype; terminal types used for interactive CLI and GUI
applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Service (daemon)

A

A process that involves no interaction with a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applications

A

Any process that the user can interact with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password

A

A series of characters known by a user and used in conjunction with user
accounts to assure a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Login prompt

A

Triggers applications and services (daemons) to instantiate and group into
process groups when a user logs in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Command-line interface (CLI)

A

A user interface that allows for typing commands within a
Linux system; starts on bootup or launches from the graphical user interface (GUI) via the
terminal emulator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Graphical user interface (GUI)

A

A user interface that provides interaction with a windowed
environment to launch applications with a pointing device (e.g., a mouse); generally starts on
bootup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

GNU Core Utilities (coreutils)

A

A foundational Linux component that provides common
commands integrated with the command-line interface (CLI). The coreutils package contains
many common commands that include but are not limited to ls, mv, cp, touch, cat, and pwd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

X server

A

A foundational Linux distro component that provides a graphical user interface
(GUI)

22
Q

Package management

A

A foundational component that provides software and service
installation, updates, and removal

23
Q

Client

A

Requests resources or services from a server

24
Q

Server

A

Provides resources or services for a client

25
Q

Protocols

A

Used by computer systems to agree on how to communicate with one another
over a network

26
Q

Vulnerabilities

A

Weakness in software or a system

27
Q

Threats

A

Actor that seeks to exploit vulnerabilities

28
Q

Exploits

A

An action taken by an actor to compromise a system by using vulnerabilities

29
Q

Ransomware

A

Malware used to deprive organizations of access to their information until
they pay a ransom

30
Q

Bot

A

A system infected by malware that allows for remote command and control (C&C) of the
infected systems

31
Q

C&C

A

Command and control or C2; refers to systems that control already infected systems
(bots) to launch various attacks (e.g., a DDoS or a coin-mining operation)

32
Q

Worms

A

Malware that propagates by detecting other systems on a network with specific
vulnerabilities and then by replicating its code on the system to exploit those vulnerabilities

33
Q

Shellshock

A

A vulnerability that existed for 30 years before being noticed in 2014; remains
an enterprise threat. Shellshock exploits a BASH vulnerability to provide an attacker with
elevated privileges that they would not have otherwise.

34
Q

Distributed Denial of Service (DDoS)

A

An attack that uses C&C and bots to send traffic to
systems that overwhelm those systems

35
Q

Kali Linux

A

A popular Linux distro that includes many useful security tools

36
Q

hashcat

A

An advanced password recovery utility that can determine the strength of
passwords based on the amount of time it takes to crack the password

37
Q

Endpoint security

A

Security controls installed on endpoint systems, such as computers

38
Q

ClamAV

A

A toolkit and malware detection engine that can quickly scan files

39
Q

Firewall

A

A system or device that has configurable rules that protect systems from other
hosts on the network

40
Q

iptables

A

A firewall software package for Linux systems

41
Q

DDoS mitigation

A

The people, processes, and technology involved in thwarting a DDoS
attack

42
Q

Hardening

A

An all-encompassing term that describes tools, controls, and processes used to
increase infrastructure security

43
Q

User configuration

A

Proper password rules and user setup, which are critical to server
security and required in modern server software

44
Q

Business requirements

A

The processes, assets, people, and practices that are necessary
for a business to operate and that must be considered when assessing security updates

45
Q

“Over hardening”

A

Occurs when the application of security controls impacts the ability of
users to work on a system (i.e., availability is impacted)

46
Q

“Under hardening”

A

Occurs when there are insufficient security controls in place to address
risks identified in the risk management process

47
Q

Access control

A

A security control that endeavors to limit access to individuals who need
permission to obtain specific information

48
Q

Baselining

A

A standard set of security configurations applied to a set of similar systems in an
organization

49
Q

Security controls

A

Any administrative, technological, or physical controls used to implement
proper security

50
Q

Host firewall

A

A generic term for a firewall installed on a host system. Example:
iptables/nftables

51
Q

Patching

A

Software updates that remediate security vulnerabilities

52
Q

Center for Internet Security (CIS) Benchmarks

A

Industry practice security configurations.
Three profiles are available: Level 1, Level 2, and STIG. Each profile addresses specific
organizational and system risks that find the right hardening balance.