10.3 Flashcards
This team is in charge of defensive security, implement controls, security monitoring, incident response,
Blue team
This team is in charge of improve overall security posture, and collaborative security
Purple team
The scanning tool – – – – – GUI version – – – – are designed to scan large networks quickly and provide information about a Netwerk and its host
Nmap and zenmap
Nmap began as a simple – – – – which is an application that searches advice for open ports indicating which insecure service might be used to craft an attack
Port scanner
This program developed by terrible security performs even more sophisticated vulnerability scans than a map among other things it can identify an encrypted, sensitive data saved on your networks host the program can run on your net work or from an offsite service continuously maintain an updated by the developer
NESSUS
This popular penetration testing tool combines known scanning and exploit techniques to explore potential new attack routes
Metasploit
This was formally known as a man trap hurry to confined space between two lock doors were one door much luck close before the other can open
Access control vestibule
This allows you controlled access to Quitman computers packages hardware in need of repair or even two written account credentials stored for emergency access
Smart locker
Identifies physical penetration temperature extremes input voltage variations input frequency variations were certain kind of radiation
Tamper detection
Security device against Netwerk what software is supported attacks
Device hardening
The process of property management in applying security patches include the following
Discovery, standardization, defense in depth, vulnerability reporting, implementation, assessment, risk mitigation.
This type of account should only be used when those higher privileges are necessary to accomplish a task
Limited use account
Many companies require the privileged account to be accessed only on location so that no one not even legitimate network administrator can access the device remotely and make a high-level changes from the outside to protect the net worth
Limited location account
Privilege account should be carefuly accounted for and disabled as soon as they are not needed
Limited duration accounts
The password for this account should be especially secure and difficult to crack
Limited access