CYBER 160 Module 2~ Threat management and cybersecurity resources Flashcards
type of test that exploits vulnerabilites just as a threat actor would and gain unauthorized access
pen test or penetration test
monetary reward given for uncovering a software vulnerability
bug bounty
limitations or parameters in a penetration test
rules of engagement
returning all system back to normal following a penetration test
clean up
gathering information from outside the organization
footprinting
directly probing for vulnerabilities and useful information
active reconsissance
Ex: unprotected wireless data transmissions from wireless local area networks
searching for wireless signals from an automobile or on foot using a portobale computing device
war driving
efficient means of discovering a Wi-Fi signals using drones
war flying
searching online for publicly accessible information
passive reconnissance
publicly accessible informaiton
open source intelligence (OSINT)
frequent and ongoing process often automated that continuously identifies vulnerabilities risks and monitors cybersecurity progress
vulnerability scan
valid authentication credentials such as username and password which are supplied to vulnerability scanners to mimic the work of a threat actor who posses the credentials
credential scan
Type of major vulnerability scan
vulnerability scan that provides no authentication information to the tester
non-credential scan
vulnerability scan that attempts to employ any vulnerabilities which it finds like threat actors
intrusive scan
vulnerability scan that does not attempt to exploit the vulnerabilities but only records that of what it discovered
nonintrusive scan