Comptia App Flashcards
/etc/shadow file for Linux
Contain passwords and is a popular target for brute force attacks
Air Gap
Physical Separation that will require manual transport of files, patches, and other data between 2 environments. Security measure that involves physically isolating a computer or network and preventing it from establishing an external connection
Audio Steganography
Hiding a secret messages/data into an audio file
Bytes/Bits
Used in traditional data exchanges
CASB
Cloud Access Security Broker
Software tool/service. Acts as a gatekeeper allowing the organization to extend the reach of their security policies into the cloud
CER
Cross Error Rate – The point where FAR & the FRR cross over. Provides a means of comparing biometric systems based on efficiently…Lower CER = More desirable
Cryptographic Hashes
Used for integrity checking of files, network packets, and a variety of other applications
CSRF/XSRF (A.K.A.- Session Riding, Sea Surf)
Cross Site Request Forgery – takes advantage of the cookies and URL parameters legitimate sites used to help track serve their visitors. Tricks a web browser into executing an unwanted action in an application to which a user is logged in
DHCP
Dynamic Host Configuration Protocol
Sniffing or snooping can be enabled to prevent rouge DHCP servers as well as malicious DHCP traffic
Used to automatically assign an Internet Protocol (IP) address to any device on a network so they can communicate using IP
Assigns IP address to your laptop, phone, iPad etc. And when your use Wi-Fi at home the router is a DHCP server
Port 67 (server destination) 68 (client)
https://bluecatnetworks.com/glossary/what-is-dhcp/
DMZ
Demilitarized Zone – Perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic
ECC
Elliptic Curve Cryptography – key-based technique for encrypting data. Small key size but is still very secure
Used a lot in mobile devices. Asymmetric
Extranet
Private networks that allow access to partners or customers but not to the general public
FAR
False Acceptance Rate
Faraday Cage
Placed around an area or device to block electromagnetic signals (EMI – Electromagnetic interference)
Fileless Virus
Type of malicious activity that uses native, legitimate tools built into a system to execute an attack. Uses legitimate programs (PowerShell) to infect a computer
FRR
False Rejection Rate
HSM
Hardware Security Model - Physical device that acts as a secure crypto processor during the decryption process.
Tamper resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
Cryptoprocessor - carries out cryptographic operations
IaaS
Infrastructure as a Service – Provides essential compute, storage, and networking resources on demand.
Provides virtualized computing resources over the internet
Enables a consumer to outsource computing equipment purchases and running their own data center
Intranet
Internal service. Part of a network or website only accessible to individuals and systems inside of specific company
LDAP
Lightweight Directory Access Protocol
Protocol that facilitates directory creation, maintenance, and authentication
Open, vendor-neutral application protocol for accessing and maintaining that data
Client/server protocol used to access and manage directory information
Network repositories of network configuration information such as user accounts, groups…can use the TLS network security protocol.
Port 389…
Port 636 TLS/SSL…Provides encryption by default on this port (LDAPS)
MSSP
Managed Security Service Provider – Outside company that handles security tasks
Provides SECurity as a Service (SECaaS)
Network Load Balancers
Network Load Balancers
Distributes traffic among systems. Distributes network traffic across multiple WAN links, virtual machines, or servers to avoid overloading any single host without using complex routing protocols. Can also help monitor system performance, report on issues, and assure loads match the capabilities system
PaaS
Platform as a Service – Cloud computing where the hardware and software platform is provided by a third party
Enables consumers to rent fully configured systems that are set up for specific purpose
Private Cloud
On-Premises cloud computing
Protected Cable Distribution
Wire line or fiber optic system that includes safeguards and countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information through an area of lesser classification or control
Qualitative Risk Assessment
Subjective and requires expertise on systems and infrastructure. Cheaper and faster
Quantitative Risk Analysis
Requires detailed financial data, complex calculations and is time consuming.
Uses ALE (annual loss expectancy) values to prioritize risks
Qubits
Encryption keys used for quantum key distribution are sent in the form of qubits
RADIUS
Remote Authentication Dial-In User Service – Provides AAA…802.1x. Centralized authentication
Port 1645/1646 & 1812/1813 (Authentication & Authorization = 1645/1812, Accounting = 1646/1813)
Centralized network authentication server that can be used for network access control (NAC)
Provides centralized authentication services for devices such as Ethernet switches and wireless routers
SAN Replication
Storage Area Network Replication
Copies the contents of one repository to another repository such as an organization’s central SAN environment to a remote SAN at the hardware or block level
SDN
Software Defined Network - Usually integrated with your virtualization infrastructure. Enables you to deploy and manage virtual switches, routers, and firewalls virtually, through software
SaaS
Software as a Service – Supplies a particular application
SQL Injection
Exploits vulnerability in the code of websites and web apps that allows attackers to hijack back-end processes and access, extract, and delete confidential info from databases….1=1
Stateful firewall/Dynamic packet filtering
Inspects traffic based on context or state of ALL traffic. Defends based on traffic patterns and flows
Stateless firewall
Focuses on individual packets, using preset rules to filter traffic. Looks at every packet individually
UAV
Unmanned Aerial Vehicles (Drones)
VM Sprawl
Virtual Machine Sprawl – When network has more virtual machines than staff can manage
Windows SAM
Windows Security Account Manager - Contain passwords and is a popular target for brute force attacks
XSS
Cross Site Scripting – malicious scripts are injected into otherwise benign and trusted websites