Definitions Flashcards
Data steward
The data steward is primarily responsible for data quality. Ensuring the data is collected and stored in a format containing values that comply with applicable laws and regulations.
Data custodian
The data custodian handles all data and manages the system on which the data assets are stored.
Data Owner
The owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls.
Data Processor
The data processor is the entity engaged by the data controller to assist with technical collection, storage, or analysis tasks.
Cross-Site Scripting (XSS)
When an attacker uses a web application to ‘send malicious code’ to a different end user.
Occurs when web apps contain ‘reflected input’.
‘Client Side Vulnerability’.
Cross-Site Request Forgery (XSRF or CSRF)
‘Exploits trust’ that a user has in a website to ‘execute code’ onto the users computer.
What’s the difference between XSS and XSRF
Cross-site scripting (or XSS) allows an attacker to execute arbitrary JavaScript within the browser of a victim user. Cross-site request forgery (or CSRF) allows an attacker to induce a victim user to perform actions that they do not intend to.
Dynamic-Link Library (DLL) Injection attack
When malware tries to inject code into the memory process space of a library using a ‘vulnerable/compromised DLL.’
Lightweight Directory Access Pool (LDAP) Injection attack
Exploits the weaknesses in LDAP implementations.
Occurs when users ‘input is not properly filtered’.
‘Unauthorized quire’s’.
Extensible Markup Language (XML) Injection attack
When users enter values that query XML (known as XPath) with values that take advantage of exploits.
Similar to SQL, but does not have the same ‘access control’ so exploits can return entire documents.
List the Events of the Cyber Kill Chain
Reconnaissance
Intrusion
Exploitation
Privilege Escalation
Lateral Movement
Obfuscation
Denial of Service
Exfilitration
RIEPLODE
Address Resolution Protocol (ARP) poisoning
To sniff all traffic on a switched network. ARP poisoning occurs when an attacker, with access to the network, redirects an IP address to the MAC address of an unintended computer.
List Layers of the OSI Model
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
PLEASE DO NOT THROW SAUSAGE PIZZA AWAY
List the Incident Management Framework
- Detection
- Response
- Mitigation
- Reporting
- Recovery
- Remediation
- Lessons Learned
DRMRRRL
A Directory Traversal Attack
Directory traversal (also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files.