Cyber Kill Chain & Acronyms Flashcards

1
Q

Reconnaissance

A

The attacker gathers information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Weaponization

A

The attacker creates malware or tools to exploit the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Delivery

A

The attacker delivers the weaponized payload to the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploration

A

The attacker exploits a vulnerability to execute the payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Installation

A

The attacker installs malware on the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and control (C2)

A

The attacker establishes a command channel to control the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Actions on objectives

A

The attacker achieves their goals, such as data exfiltration or disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CRL

A

Certification revocation list (list of certificates that have been revoked before they expired, maintained by certificate authority) (not up to date)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSR

A

Certificate signing request (block of encoded test submitted to CA to apply for a digital certificate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OCSP

A

Online certification status protocol (internet protocol to obtain the revocation status of an X.509 certificate (alternative to CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TTPs

A

Tactics, techniques, procedures (behavior and methods use by threat actors to execute cyberattacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCAP

A

Security content automation protocol (suite of open standards that enable automated vulnerability management, measurement, and policy evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CASB

A

Cloud access security broker (security solution sites between an organizations users and CSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

Common vulnerabilities and exposure (list of publicly disclosed computer security flaws) (standardized approach)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BASTIONS

A

Special purpose computer designed to withstand attacks (placed outside network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SASE

A

Secure access service edge (combines network security with WAN to deliver as cloud server)

17
Q

HIDS

A

Host intrusion detection system (monitors and analyzes the activities on a specific host)

18
Q

HIPS

A

Host intrusion prevention system (security system designed to protect individual hosts, such as computers or servers, from security threats)