2.0 Protect Flashcards
Data analytics
Intrusion prevention systems and tools
Security vulnerability databases
CVE
CSS
Acceptable use policy
Network access control (NAC)
Disaster recovery and business continuity plans
Remote work policies
Active Directory Group Policy Objects (GPOs)
Footprinting
Scanning
Enumeration
Gaining access
Web attacks
Password attacks
Wireless attacks
Social-engineering
Man-in-the-middle
Malware
Out-of-band
DoS
DDoS
Resource exhaustion
Forced system outage
Packet generators
Organizational structure
Internal teams
Personnel roles and responsibilities
Communication policies and procedures
Knowledge sharing processes
Conflict management
Law enforcement
Vendors
Intrusion prevention systems (IPS)
Intrusion detection systems (IDS)
Firewalls
Network segmentation
Endpoint detection and response (EDR)
least privilege
Separation of duties
Password enforcement policies
Active Directory hygiene
Patch management
Mobile device management (MDM)
Identify assets
Cybersecurity polices and procedures
Data security polices
Cybersecurity auditing processes and procedures
Audit objectives
Network structure
Compliance standard
Document and communicate results
Review assessments, audits, and inspections
Analyze critical issues for action
Develop plans of action
Specify success criteria
Remediation planning
Resource implications
Monitoring procedures
Software updates
Scope
Attributes
Vulnerabilities
Firmware updates
Scope
Attributes
Vulnerabilities
Software patches
Enterprise resources
Access control
Authentication systems
Remote access monitoring
Cybersecurity policies and procedures
Identity management
Authorization
Infrastructure/physical security
Physical security controls
User credentials