Exam 1 Flashcards
Process of Auditing A Network or Application for Known Exploits
Vulnerability Scanning
Control Designed to Physically or Logically restrict unauthorized access
Preventative Control
Method of Assessing the Security of Systems available to an insider
Credentialed Scan
Preventing an incident from spreading to other areas
Containment
The art of making a message difficult to understand
Ohdufucation
The only truly unbreakable encryption mechanism
One-Time Pad
Document that shows a red team has obtained permission to perform a penetration test
Personal Letter of authorization - Get out of jail free card
Property that an encryption key should not be derivable from the ciphertext
Confusion
Control Designed to discourage an attacker from attempting an attack
Deterrent
Action taken to reduce the likelihood of a threat occuring
Mitigation
Completely removing the cause of an incident
eradication
Process of returning to normal operations following and incident
Recovery
Security principle that states data should only be modified by authorized individuals
Integrity
Control designed to identify and record any attempted intrusions
Detective
Property that predictable features of the plaintext should not be evident in the ciphertext
Difusion
Limits established for security assessments
Rules of engagement
Goal of ensuring that someone cannot deny sending or creating certain data
Non Repudiation
Security tool used to lure attackers away from actual network systems
Honey Pot
Documents that detail requirements for protecting technology and information assets
Security Policy
Member of an incident response team who initially takes charge
First Responder
Method of Isolating a particular system or network for analysis following an incident
Quarantine - Sandboxing
Obtaining access to an it manager’s credentials after compromising another employee
Escalation of Privelages
Control that restores the function of the system through some other means
compensating
Implementing security controls at various levels
Defense in Depth or Layered Security
Control responds to and fixes an incident any may also prevent its recurrence
Corrective Control
Specific method for establishing a shared secret across an insecure channel (a method of securely exchanging cryptographic keys over a public channel)
Diffle-Hellman Merkle
Tactic to obtain someone’s credentials through observations
Shoulder Surfing
Obtaining information from publicly available sources
Opensource Intelligence
A form of malicious code that appears to perform one service, but also hides another purpose
Trojan Horse
Intercepting and logging traffic that passes over a network
Packet Sniffing
Malicious code that enables administrator-level access to a computer or network
RootKits
A hidden method used to gain access to a computer system; Sometimes used by software developers
Backdoors
Failing to shred documents leaves them vulnerable to this type of attack
Dumpster diving
Common motivations and intents can be used to group attacker into these
Threat Actors
Path or tool used to exploit a vulnerability
Threat Vector
Used by attacker to discover unprotected wireless networks
War Driving
Error in establishing or maintaining a security control
Misconfiguration
Method of entering a secured area without authorization
Tailgating - Piggy Backing
Hactivists are known for employing this type of attack
Denial of Service
Replaying and spoofing packets would be classified as this
Injection
A form of malicious code that is triggered by a specific event or condition
Logic Bomb
Technique used to determine what is running on a particular system
Service Discovery or Fingerprinting
Technique used to convince Burger King workers to break the windows of the restaurant
Intimidation
Utility to show network information, such as active connection and routing tables
Netstat
Claiming someone has given you permission
Authority
Most challenging type of Threat Actor
Malicious Insider
An arbitrary 24-bit number used along with a secret key for data wep encryption
Initialization Vector
Malware capable of stealing typed credentials
Keylogger
Attacker’s ability to obtain, maintain, and diversify access
Advanced persistent threat
Specific setting to listen to all nearby wireless traffic
Promiscuous Mode
Research activity that involves running specific queries
Google Hacking