Cyb 3800 Security Plus Vocab Flashcards
Blockchain
An advanced database that allows information sharing within a buisness
Cipher
A method of secret writing using substituion or transition of letters acoring to a key
CVSS Review
The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity
Discretionary Access Control (DAC)
The principal of restricting access to objects based off the identity of the subject.
Enhanced open
Improved data. encryption on open wifi
Footprinting
First step in penetration testing, scanning open ports and collecting information on the host.
Hping
open source packet generator and analyzer
ISO 27701
A framework for data privacy controls
Mean Time Between Failures (MTBF)
A predicted elapsed time between failures.
NIST
The National Insitute of Standards and Technology
Pass-the-Hash Attack
An attacker captures a password hashthen passes through for authenification.
Race Condition
condition of electronics, software, ect.
SCADA
Supervisory Control and Data Accuisition
SNMPV2c
Enhanced protocal packet types.
Subject Alternate Name (SAN)
Lets you specify Additional host names
Timeline
A graphic Representation of the passage of time.
VM
Virtual Machine
Annual Rate of Occurrence (ARO)
The Annual Rate of Occurrence (ARO) is a risk assessment concept used to estimate how often a specific risk event is expected to happen in a year.
Bluetooth
Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using short-wavelength UHF radio waves in the ISM band from 2.402 GHz to 2.48 GHz.
Correlation engine
A correlation engine is a sophisticated software tool or system component designed to analyze and correlate events and data from multiple sources in real-time or near-real-time.
Data steward
A Data Steward is a role within organizations responsible for managing the company’s data assets to ensure they are accurately maintained, accessible, secure, and compliant with relevant standards and regulations.
Domain Reputation
Domain reputation measures a domain’s trustworthiness, impacting email deliverability and search visibility. It’s influenced by email practices, security measures, and a history of abuse.
Fail over solution
A failover solution is a backup operational mode in which the functions of a system automatically switch to a standby system when the primary system fails or is temporarily unavailable.
Gamification
Gamification involves integrating game mechanics and dynamics into non-game environments, such as websites, learning platforms, and business processes, to motivate participation, engagement, and loyalty.
Identity and Access Management
Identity and Access Management (IAM) is a framework of policies and technologies for ensuring that the right individuals have access to the appropriate resources and information within an organization.
Kiting
Kiting is illegal and considered fraudulent because it misrepresents an individual’s or entity’s financial position and can lead to significant financial losses for banks or financial institutions involved.
Memorandum of Agreement (MOA)
A Memorandum of Agreement (MOA) is a formal document outlining an agreed-upon plan between two or more parties.
OAuth
OAuth (Open Authorization) is an open standard for access delegation commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
Powershell Script
A PowerShell script is a file that contains a sequence of PowerShell commands, instructions, and expressions.
Risky Login Policy
A Risky Login Policy refers to a set of rules and procedures implemented by an organization to identify, evaluate, and respond to login attempts that appear unusual or suspicious, indicating a potential security threat.
SIEM
Security Information and Event Management (SIEM) is a technology that provides real-time analysis of security alerts generated by applications and network hardware.
SRTP
Secure Real-time Transport Protocol (SRTP) is a security protocol that provides encryption, message authentication, and integrity for voice and video data being transmitted over a network.
Tasting
Tasting, in the context of domain names, refers to the practice of registering a domain name to evaluate its potential for generating traffic and revenue, typically through advertising, without immediately committing to long-term registration.
traceroute
Traceroute is valuable for troubleshooting network issues, such as delays or failures in data reaching its destination, by identifying where along the path the problem occurs.
WinHex
WinHex is a versatile digital forensics tool, which serves as a hexadecimal editor for data recovery, low-level data processing, and IT security.
blockchaining
An advanced database mechanism that allows transparent information sharing within a business network.
compensating
Measures taken to address any weaknesses of existing controls or to compensate for the inability to meet specific security requirements due to various different constraints.
Data custodian
A person who has technical control over an information asset dataset.
DLP Systems
(Data Loss Prevention): A solution that detects and prevents data breaches.
Eradication
The phase of effective incident response that entails removing the threat and restoring affected systems to their previous state, ideally while minimizing data loss.
FTK Imager
(Forensic Toolkit): A data preview and imaging tool that creates copies of computer data without making changes to the original evidence.
Hping
A TCP/IP packet assembler and analyzer that works on most operating systems such as Mac, Windows, Linus, and Solaris.
IV Attacks
(Initialization vector): An attack on wireless networks that modifies the IV of an encrypted wireless packet during transmission.
Mean Time to Failure (MTTF)
Te average time between non-repairable failures of a technology product.
NIST CSF
(National Institute of Standards and Tecnology Cybersecurity Framework): A set of guidelines for mitigating organizational cybersecurity risks.
PCI DSS
(Payment Card Industry Data Security Standard): An information security standard designed to reduce payment card fraud by increasing security controls around cardholder data.
RBAC
(Role-based Access Control): Restricts network access based on a person’s role within an organization.
SCAP
(Security Content Automation Protocol): A method for using specific standards to enable automated vulnerability managemetns, measurement, and policy compliance evaluation.
SNMPV3
(Simple Network Management Protocol Version 3): Collects and organizes information about the devices it manages on the network.
Supplicant certificates
Provides authentication credentials to a secured network.
TLS- Transport layer security
Encrypts data that is sent over a network to ensure security.
VoIP
(Voice over internet Protocol): A form of communication that allows for phone calls to be made over a broadband internet connection instead of phone lines.
Annual Loss Expectancy (ALE)
The anticipated monetary loss that an organization expects to incur within a year due to security incidents or risks.
Bluesnarfing Attack
Unauthorized access and theft of data from a Bluetooth-enabled device, exploiting Bluetooth vulnerabilities to extract sensitive information without the user’s consent.
Corrective-action report
Document detailing steps taken to address and resolve an identified problem or issue within an organization, including investigation, root cause analysis, and implementation of corrective measures.
Data Protection Officer (DPO)
Individual responsible for ensuring compliance with data protection laws within an organization.
Domain Hijacking
Unauthorized or illegal acquisition of control over a domain name, often achieved through unauthorized access to domain registrar accounts or manipulation of domain registration records.
Expected Frequency (EF)
The anticipated rate or likelihood of occurrence for a specific event or incident within a given timeframe.
Fuzzing
A software testing technique that involves inputting invalid, unexpected, or random data into a program to uncover bugs, vulnerabilities, or crashes.
IAC
IAC or infrastructure as code, is when infrastructure configuration is managed using code and automation tools rather than manual processes.
Key stretching
A cryptographic technique used to strengthen passwords or cryptographic keys by increasing their computational complexity.
memdump
The process of creating a snapshot or copy of a computer’s volatile memory (RAM) at a specific point in time.
NXlog
A high-performance log management tool for collecting, processing, and forwarding log data from various sources to centralized log management systems or other destinations.
Port Scanning
A technique used to identify open ports and services on a computer or network by sending packets to a range of port numbers and analyzing the responses.
RFID
Radio Frequency Identification is a technology that uses electromagnetic fields to automatically identify and track tags attached to objects.
Short Message Service
A text messaging service that allows users to send and receive short text messages, typically limited to 160 characters per message.
SOX
The Sarbanes-Oxley Act, a U.S. federal law enacted in 2002 to improve corporate governance and financial reporting standards following accounting scandals.
Tabletop
A user interface concept where digital content, such as documents, photos, or applications, is arranged and manipulated on a virtual tabletop-like surface, allowing users to interact with the content in a more tactile and intuitive manner.
TPM
Trusted Platform Module is a dedicated hardware component that provides a secure cryptographic foundation for various security-related functions, such as encryption key generation and storage, secure boot, device authentication, and integrity measurement.
WI-FI
Wireless technology that enables devices to connect to a local network and access the internet without the need for physical cables.
Blackhole
A black hole refers to a place in the network where incoming or outgoing traffic is silently discarded without informing the source that the data did not reach its intended recipient.
CHAP
CHAP is a challenge and response authentication method that PPP servers use to verify the identity of a remote user.
CVE Review
This system provides a method for publicly sharing information on cybersecurity vulnerabilities.
Disassociation Attack
A type of DoS attach on a wireless network.
End of Service Life (EOSL)
Used to indicate the ending of services and updates for server, storage, and network equipment.
Fog Computing
Technology that extends cloud computing and services to the edge of an enterprises network.
HOTP
HMAC-based One-time password.
ISO
International standard for information security
Mantrap
Small room with an entry door on one wall and an exit door on the opposite wall.
Nikto
Command-line vulnerability scanner that scans web servers for dangerous files.
PAP
PPP authentication method that uses passwords to validate users.
Quantum computing
Uses specialized technology to solve complex problems that classical computers can’t solve.
Sandboxing
Security mechanism for separating running programs.
Sn1per
Tool used during a penetration test to scan for vulnerabilities.
Stratum 1 time server
Acts as a primary network time standard.
theHarvester
Command-line tool in Linux that finds email accounts, subdomain names, virtual hosts, open ports, and employee names.