Chapter 1 Flashcards
Open Source
A Software’s Source Code and Programming Language are Open for Anyone to Access & Modify
Closed Source
Commercial Software developed for a profit
Bastion Host
A System Exposed to the Outside World in order to Protect more Sensitive Systems
NAT
Network Address Translation
RHEL
Red Hat Enterprise Linux
IDS
Intrusion Detection System
System Hardening
Remove All but Critical Services and Users
(Reduce Attack Surface)
SIEM
Security Information & Event Manager
TLS
Transport Layer Security
RDP
Remote Desktop Protocol
Hacker
A Programming and Problem Solving Expert
Black Hat Hacker
A Hacker that Performs Malicious Attacks against Victims
White Hat Hacker
A Hacker that Performs Attacks for the Good of Others
Gray Hat Hacker
Goes a Little Further than a White Hat, but not as far as a Black Hat