CYBRSCRTY-MODULE 2 Flashcards
Benchmark/secure configuration guides
Guidelines for configuring a device or software usually distributed by hardware manufacturers and software developers
Adversary tactics, techniques, and procedures (TTP)
A database of the behavior of threat actors and how they orchestrate and manage attacks
Black box
A penetration testing level in which the testers have no knowledge of the network and no special privileges
Blue Team
A penetration testing team that monitors for Red Team attacks and shores up defenses as necessary
Bug bounty
A monetary reward given for uncovering a software vulnerability
Center for Internet Security (CIS)
A nonprofit community-driven organization
Cleanup
Returning all systems back to normal following a penetration test
Cloud Controls Matrix
A specialized framework of cloud-specific security controls
Cloud Security Alliance (CSA)
An organization whose goal is to define and raise awareness of best practices to help secure cloud computing environments
Common Vulnerabilities and Exposures (CVE)
A tool that identifies vulnerabilities in operating systems and application software
Common Vulnerability Scoring System (CVSS)
A numeric rating system of the impact of a vulnerability
Configuration review
An examination of the software settings for a vulnerability scan
Credentialed scan
A scan in which valid authentication credentials, such as usernames and passwords, are supplied to the vulnerability scanner to mimic the work of a threat actor who possesses these credentials
Drone
An unmanned aerial vehicle (UAV) without a human pilot on board to control its flight
European Union General Data Protection Directive (GDPR)
A regulation regarding data protection and privacy in the European Union and the European Economic Area (EEA)
False negative
Failure to raise an alarm when there is a problem
False positive
Raising an alarm when there is no problem
Footprinting
Gathering information from outside the organization
Framework
A series of documented processes used to define policies and procedures for implementation and management of security controls in an enterprise environment
Fusion center
A formal repository of information from enterprises and the government used to share information on the latest attacks
Gray box
A penetration testing level in which the testers are given limited knowledge of the network and some elevated privileges
Intrusive scan
A vulnerability scan that attempts to employ any vulnerabilities which it finds, much like a threat actor would
ISO 27001
A standard that provides requirements for an information security management system (ISMS)
ISO 27002
A “code of practice” for information security management within an organization and contains 114 different control recommendations
ISO 27701
An extension to ISO 27001 and is a framework for managing privacy controls to reduce the risk of privacy breach to the privacy of individuals