Exam 2 Flashcards
Data person who manages access rights to the data.
Data Steward
Directed attack that attempts to obtain private or personal information. Unlike general phishing attacks, this is tailored to the victim and often includes personal information to make the attack more convincing.
Spear Phishing
Vulnerability that allows communication between separate VMs.
VM escape
Type of wireless attack in which attacker sends unsolicited messages to bluetooth-enabled devices. Usually done to surprise or annoy the user.
Bluejacking
Allows you to create separate virtual local networks within a single physical network. Each separated network acting as its own private network.
VLAN - Virtual Local Network
A method used by routers to allow multiple devices on a local network to share a single public IP address. It translates private IP addresses to the public IP address for outgoing traffic and vice versa for incoming traffic, providing address conservation and an added layer of security.
NTA - Network Address Translation
Security solution that enforces policies to control which devices can access a network and what they can do once they are connected.
NAC - Network Access Control
Segmentation strategy that separates devices or networks by physically disconnecting them from each other.
Air Gap
Time concept that defines how much data loss would be acceptable during a recover.
RPO - Recovery Point Objectives
Network protocol that centralizes the authentication, authorization, and accounting of network access. It simplifies managing user access, enhances security, and provides detailed usage tracking, making it an ideal solution for network environments that require centralized control.
RADIUS
Suite of protocols designed to secure internet communications by encrypting and authenticating data packets. Used for securing network communications.
IPSec
Type of cyber attack where an attacker gains unauthorized control over a client device or its communications.
Clint Hijacking
Actions taken to reduce the impact or likelihood of a risk. For example, using security measures like backups to lessen the damage from a ransomware attack.
Mitigation
Ackwnoledging a risk and choosing to deal with the consequences if it occurs, rather than trying to avoid or transfer it.
Acceptance
Shifting the risk to another party, such as by purchasing insurance.
Transference
Process of installing applications on a device from other source other than the official app store.
Sideloading
Used for sending multimedia messages, such as pictures and videos, via text messaging.
MMS - Multimedia Messaging Service
Sharing a mobile device’s internet connection with another device, such as using a phone’s data connection to provide internet access to a laptop.
Tethering