CASP+ Glossary Flashcards

1
Q

2 Step Verification

A

An authentication method that uses out of band mechanisms and generates a token serverside that is sent to the user to provide for verification. This might be an SMS message with a code, a phone call, a push notification to a mobile phone or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3D Printing

A

An emerging tech that uses special purpose printers that build 3D objects rather than printing on paper. Printing is done by adding layers on top of layers according to model using computer aided design (CAD) software. It allows for rapid design and the creation of just about anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1x

A

An authentication protocol that uses Extensible Authentication Protocol (EAP) for wireless, ethernet, or VPN gateway to provide authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control List (ACL)

A

A broad term that outlines how objects are allowed to interact with each other on a network or system. In networking, devices like switches or routers may grant or deny access based on their own ACLs. Similar to a firewall, it helps filters and route traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Space Layout Randomization (ASLR)

A

A buffer overflow prevention control that makes it difficult to guess the memory locations of executables stored in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversary Emulation

A

A discipline in cyber that involves using TTPs (tactics, techniques and procedures) of a specific threat actor in a realistic way to test current defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agile Model

A

In this approach to software development, an interative process is used to release well tested code in smaller blocks. Development is continuous. It is adaptive to allow for changes throughout the process. It focuses on rapid development, sometimes at the expense of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Air Gap

A

A host that is physically disconnected from any network so as to protect that network by being segmented from it (This is a form of segregation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aircrack-ng

A

A suite of tools for assessing and analyzing WiFi. It is used to monitor, attack, test and crack WiFi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analytical Zone

A

A form of cloud based data zone where data is used for practical purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Annual Loss Expectancy (ALE)

A

The total cost of all the single loss events that happen over the course of a year - added together. ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Annual Rate of Occurrence (ARO)

A

The number of times in a year that a single loss event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anonymization

A

A process that removes data that could be used to uniquely identify a person. It is a common requirement in compliance laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AV Software

A

Software that detects and identifies malicious software on an endpoint. Originally, AV programs were signature based file scans that would detect viruses, but now they monitor when processes are launched, intercept them and look for signature matches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API CASB Configuration

A

A configuration of CASB (Cloud Access Security Broker) where an API brokers connection between the cloud provider and the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application Virtualization

A

A client accesses an application hosted on a server. This usually occurs through a browser. It allows for specific apps to shared from a single server through a users browser

17
Q

Asset Reporting Format (ARF)

A

A SCAP Language that correlates reporting formats to device information

18
Q

Asset Value

A

Within Qualitative risk analysis, this is the value that a given asset is worth

19
Q

Attestation of Compliance

A

The set of policies, contracts and standards between two entities that have been designated as essential. It will identify how the relationship will be governed including how incidents will be reported and addressed, the use of independent auditors, data protection requirements and violation agreements

20
Q

Attribute Based Access Control (ABAC)

A

An access control method that is fine grained, as it utilizes a combination of any attributes to determine a users access level. Uses eXtensible Access Control Markup Language (XACML)

21
Q

Authentication Bypass

A

An attack that exploits how logins are received and processed by web applications. An example would be sending an SQL string rather than the login credentials the app is expecting

22
Q

AWS CloudTrail

A

An audit logging service for AWS apps

23
Q

AWS CloudWatch

A

A graphical reporting and analytics service that provides monitoring and alerting in AWS

24
Q

BGP/Route Hijacking

A

An attack that involves hijacking BGP routing. BGP is the routing protocol of the Internet. it is designed when security wasnt a consideration, so it depends on interconnected networks to truthfully and accurately maintain the routing tables

25
Q

Big Data

A

Data collections that are too big for traditional database tools to utilize. Ideally suited to AI as the larger dataset for AI to study, the more effective it will be

26
Q

Binwalk

A

A tool that can be used to inspect binary firmware image files to better understand what is inside the file itself

27
Q

Blob Storage

A

A cloud based storage model that supports the storage of large amounts of unstructured data. It is used to store archives and backups

28
Q

Block Cipher

A

An encryption where plaintext is separated into equal sized blocks, usually 128 bits in size. If there isnt enough data to fill a block, it is padded to make up the rest of the space. Each block is then encrypted based on the mode of operation being used

29
Q

Block Storage

A

A loud based storage model that supports high performance, transactional apps like databases

30
Q

Bootstrapping

A

A method of automation in a cloud deployment that involes automatically deploying instances

31
Q

BYOD

A

Bring your own device
A mobile device policy where employee owns the device, but the device must meet corporate specifications and allow auditing. With this type of policy, it is not as easy to fully secure devices as when they are corporately owned and issued by the co

32
Q
A