D Flashcards

1
Q

DAD Triad

A

The 3 key treats to cybersecurity efforts: disclosure, alteration, and denial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dark Web

A

An anonymous network created through encryption technology and often used for illicit activity. 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dashboard Reporting

A

Utilizes visual aids like graphs and charts to summarize risk data, usually in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data At Rest

A

Stored data that resides on hard drives, on tapes, in the cloud, or on other storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Breach Notification Law

A

Laws requiring the notification of data subjects after a known or suspected breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Classification Policy

A

A document that describes the classification structure used by the organization and the process used to properly assign classification to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Controller

A

In the context of a data processor, as defined by the European Union data protection laws, the person or entity that controls processing of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data custodian

A

The user who is assigned the task of implementing the prescribed protection defined by the security policy and upper management. The data custodian preforms any and all activities necessary to provide adequate protection for data and to fulfill the requirements and responsibilities delegated to them from upper management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Exfiltration Attack

A

An attack in which access to sensitive information is gained and then removed from an organization. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Exposure

A

The concept that sensitive personal information in databases exposes and organization to risk in the event that information is stolen by an attacker. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Governance Policy

A

A document that clearly states the owner of information created or used by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data In Transit

A

Data that is in transit over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data In Use

A

Data that is actively in use by a computer system 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Inventory

A

The first step in managing sensitive data is developing a data inventory of the types of information maintained by the organization and the places where that data is stored, processed, and transmitted. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Loss

A

The exposure of sensitive information to unauthorized individuals. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Loss Prevention (DLP)

A

Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Masking

A

A tool that redacts sensitive information by replacing some of or all sensitive fields with blank characters. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Minimization

A

The techniques seeking to reduce risk by reducing the amount of sensitive information maintained on a regular basis. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Obfuscation

A

The process that transforms data into a format where the original information can not be retrieved. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Owner

A

The person responsible for classifying information for placement and protection with the security solution. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Ownership

A

The organization designates specific senior executives as the data owners fo different data types. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Processor

A

An individual or entity who processes personal data solely on behalf of the data controller. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Protection Office (DPO)

A

Data Protection Officer - A specific individual who bears overall responsibility for carrying out the organization’s data privacy efforts.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data Retention Policy

A

A document that outlines what information the organization will maintain, and the length of time different categories of work product will be retained before destruction. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data Sovereignty

A

A principle that states that data is subject to the legal restrictions of any jurisdiction where it is collected, stored or processed. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data Steward

A

An individual who is responsible for carrying out an organizations data security policies and overseeing data usage based on those policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Data subject

A

Individual whose personal data is being processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Database Encryption

A

Targets data at the database level. It is a method used to protect sensitive policies and overseeing data usage based on those policies. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Database Normalization

A

The process of removing duplication in a relational database. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Dead Code

A

Code that is in use in an organization, but nobody is responsible for the maintenance of that code, and in fact, nobody even know where the original source file reside. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Debug Modes

A

The feature that gives developers crucial error information needed to troubleshoot applications in the development process. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Decentralized

A

An approach that reduces single points of failure by spreading technology components across multiple providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DDOS

A

One of the most common forms of the distributed denial of service attacks is a network based DDOS. Malicious actors commonly use large scale botnets to conduct network DDoS attacks, and commercial services exist that conduct DDOS attacks and DDoS like behavior for stress and load testing purposes. 16

34
Q

Defensive Penetration Testing

A

Focuses on evaluating an organization’s ability to defend against cyberattacks, Unlike offensive penetration testing, which aims to exploit vulnerabilities, defensive penetration testing involves assessing the effectiveness of security policies, procedures, and technologies in detecting and mitigating threats. 16

35
Q

Deidentification Process

A

Removes the ability to link data back to an individual, reducing its sensitivity. 16

36
Q

Demilitarized Zone (DMZ)

A

A network zone that resides between an internal network and the internet used to host systems that require public access. 16

37
Q

Digital Signatures

A

Message integrity is enforced using encrypted message digests, known as digital signatures, created upon transmission. 17

38
Q

Denial

A

The unintended disruption of an authorized user’s legitimate access to information. 17

39
Q

Deny Listing

A

Developers use this method to control user input by describing potentially malicious input that must be blocked during input validation. 17

40
Q

Deprovisioned

A

When an account is terminated. 17

41
Q

Detective Controls

A

A type of access control that is deployed to discover or detect unwanted or unauthorized activity. 17

41
Q

Deterrent Controls

A

A type of access control that is deployed to discourage violation of security policies. 17

42
Q

Development environment

A

Typically used for developers or other builders to do their work. 17

43
Q

Device Driver

A

Software interface between hardware devices and the operating system. 17

44
Q

DevOps

A

Software interface between hardware devices and the operating system. 17

45
Q

DevSecOps

A

DevOps Model that includes securrity as a coe component.

46
Q

Diamond Model of Intrusion Analysis

A

An intrusion analysis model that focuses on adversaries, infrastructure, victims, and capabilities using a diamond shape to guide analysis through the connected vertices. 17

47
Q

Dictionary Attack

A

The act of attempting to crack passwords by testing them against a list of dictionary words. 17

48
Q

Differential Backup

A

A type of backup that stores all files that have been modified since the time of the most recent full backup. 17

49
Q

Dig

A

A tool that performs a lookup of an IP address to return a domain name, or a domain name to return an IP address, and looks up specific DNS information like MX (Mail server), A, and other DNS records. 17

50
Q

Digital Certificates

A

An Electonic document used to securely share private key with third parties based on the assurance provided by a certificate authority (CA). 17

51
Q

Digital Rights Management (DRM)

A

A type of protection software that uses encryption to enforce copyright restrictions on digital media. Over the past decade, publishers attempted to deploy DRM schemes across a variety of media types, including music, movies, and books. 17

52
Q

Digital Signatures

A

Message integrity is enforced using encrypted message digests, known as digital signatures, created upon transmission of a message.

53
Q

Directive Controls

A

Informed employees and others what they should do to achieve security objectives. 18

54
Q

Directory Services

A

A centralized database of resources available to the network, much like a telephone directory for services and assets. Users, clients, and processes consult the directory service to learn where a desired system or resource resides. 18

55
Q

Directory Traversal

A

An attack that allows an attacker to jump out of the web root directory structure and into any other part of the file system hosted by the web server’s host operating system. 18

56
Q

Disassociation

A

An attack in which the intruder sends a frame to a wireless access point with a spoofed address to make it look as if it came from the victim and then disconnects them from the network. 18

57
Q

Disaster Recovery Plan (DRP)

A

Disaster Recovery Plan -Term that describes the actions an organization takes to resume normal operations after a disaster interrupts normal activity. 18

58
Q

Disclosure

A

The occurrence of violation of violation of confidentiality when resources are made accessible to unauthorize entities. 18

59
Q

Discretionary Access Control

A

A mechanism used to control access to objects. The owner or creator of an object controls and defines the access other subjects have to it 18

60
Q

Disposition

A

A software development phase that occurs when a product or system reaches the end of life. 18

61
Q

Disruption/Chaos Attack

A

Attacks that are motivated by a desire to cause chaos and disrupt normal operations. 18

62
Q

DLL Injection attack

A

A variant of SQL injection, where commands may attempt to load dynamic link libraries (DLL) containing malicious code. 18

63
Q

DNS Filtering

A

Used by many organizations to block malicious domains.18

64
Q

DNS Poisoning

A

Can be accomplished in multiple ways. One form is another form of the on-path attack where an attacker provides a DNS response while pretending to be an authoritative DNS server. Vulnerabilities in DNS protocols or implementations can also permit DNS poisoning, but they are rarer.

65
Q

DNS sinkhole

A

A DNS server that is configured to provide incorrect answers to specific DNS queries. 19

66
Q

Dnsenum

A

A DNS server that is configured to provide incorrect answers to specific DNS queries. 19

67
Q

DNSENUM

A

a command line tool that is used to find DNS servers and entries for a domain. 19

68
Q

Domain based message authentication reporting and conformance (DMARC)

A

Domain based message authentication reporting and conformance (DMARC)-A protocol that uses SPF and DKIM to determine if an email message is authentic. 19

69
Q

Domain hijacking

A

Changes the registration of a domain. 19

70
Q

Domain reputation

A

Services and tolls provide information about whether a domain is a trusted email sender or sends a lot of spam email. 19

71
Q

Domain Name System (DNS)

A

Domain Name System (DNS)–The network service used in TCP/IP networks that translates hostnames to IP addresses. 19

72
Q

Domain Name System Security Extensions (DNSSEC)

A

Domain Name System Security Extensions (DNSSEC)–Provide authentication of DNS data, allowing DNS queries to be validated even if they are not encrypted. 19

73
Q

Domain Validation (DV) Certificates

A

Domain Validation (DV) Certificates The CA simply verifies that the certificate subject has control of the domain name. 19

74
Q

DomainKeys Identified Mail (DKIM)

A

DomainKeys Identified Mail (DKIM)-Allows organizations to add content to messages to identify them as being from their domain. 19

75
Q

Downgrade Attack

A

Sometimes used against secure communications such as TLS in an attempt to get the user or system to inadvertently shift to a less secure cryptographic modes. 19

76
Q

Due Care

A

Refers to the ongoing efforts to ensure that the implemented policies and controls are effective and continuously maintained. 20

76
Q

Due diligence

A

Involves thoroughly vetting potential vendors to ensure that they meet the organizations standards and requirements. 20

77
Q

Dumpster diving

A

Looking through trash for clues to find users passwords and other pertinent information. 20

78
Q

Dynamic Code Analysis

A

Analyzing the execution of code while providing it with input to test the software. 20

79
Q

Dynamic Host Configuration Protocol (DHCP)

A

Dynamic Host Configuration Protocol (DHCP)– A protocol used to assign TCP/IP configuration settings to systems upon bootup. DHCP uses UDP