General Knowledge Flashcards
Older computer systems, software, or hardware that are still in use but may be outdated or no longer supported by their manufacturers. They can pose security risks due to their inability to handle modern security threats.
Example: A company continues to use an old version of an operating system, which lacks security patches for newly discovered vulnerabilities.
Legacy Systems
Systems, software, or devices that no longer receive updates or support from the manufacturer, making them vulnerable to security threats because they don’t get patches or fixes for newly discovered vulnerabilities.
Example: A network device that is no longer supported by its manufacturer, and its firmware is not updated to address security flaws.
Newly Released Systems
Newly launched systems, software, or devices that may have undiscovered vulnerabilities, as they have not been extensively tested in the real-world environment, potentially making them targets for attackers.
Example: A newly released operating system may have bugs or security vulnerabilities that haven’t been found yet, making it an early target for exploitation.
Unsupported Systems
A security protocol for wireless networks designed to provide stronger data encryption and protection than WEP. It uses dynamic encryption keys and provides better overall security for Wi-Fi networks.
Example: A home router using this type of encryption to secure its wireless network from unauthorized access.
WPA (Wi-Fi Protected Access)
A feature designed to simplify the process of connecting devices to a secure Wi-Fi network, often using a PIN or pressing a button on the router. However, it has known security vulnerabilities. Should be avoided.
Example: Pressing this button on a router to connect a new device, such as a smartphone, to the network without entering the Wi-Fi password.
WPS (Wi-Fi Protected Setup)
An older and now outdated wireless security protocol used to secure Wi-Fi networks. It uses static encryption keys, making it vulnerable to attacks such as cracking. Should be avoided.
Example: An older Wi-Fi router that still uses this type of encryption, which can be easily cracked by attackers.
WEP (Wired Equivalent Privacy)
A protocol for enabling mobile devices to access internet services, often used for browsing websites and accessing email on older mobile phones.
Example: A mobile phone using this to access a weather service before the widespread use of smartphones with full web browsers.
WAP (Wireless Application Protocol)
A security system that monitors and filters HTTP traffic between a web application and the internet. It is designed to protect web applications from attacks such as SQL injection, cross-site scripting (XSS), and other vulnerabilities.
WAF (Web Application Firewall)
A device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless communication standards. It acts as an interface between the wireless client and the wired network.
Example: A home router functioning as this to allow laptops and smartphones to connect to the internet over Wi-Fi.
WAP (Wireless Access Point)
A formal agreement between a company and a service provider to manage and maintain security services for the company’s network or IT systems. It outlines the responsibilities, scope, and expectations for both parties.
MSA (Managed Security Agreement)
A service model where a provider offers continuous monitoring of an organization’s network, systems, or applications, often to detect and respond to security incidents.
MaaS (Monitoring as a Service)
A company that provides outsourced IT services, such as network management, security, and software maintenance, on a subscription basis.
MSP (Managed Service Provider)
A specialized type of MSP that focuses specifically on providing security services, including intrusion detection, firewall management, and vulnerability assessments, often on a 24/7 basis.
MSSP (Managed Security Service Provider)
A file format used for storing executable functions and procedures that can be shared and used by multiple programs simultaneously. These help save memory and disk space by allowing programs to use common code.
DLL (Dynamic Link Library)
A set of rules and protocols that allow different software applications to communicate with each other. These define the methods and data formats used for interactions between systems.
API (Application Programming Interface)
A file format used to store a program that can be run directly by the operating system. These types of files contain machine code that is executed when the file is opened.
EXE (Executable File)
A configuration file used to store settings for software applications. These types of files typically contain plain text with sections for different types of settings and values.
INI (Initialization File)
A security solution that monitors and responds to suspicious activities on endpoint devices, such as computers and mobile devices, to detect and mitigate threats.
Example: alerts administrators when unusual behavior, such as file encryption, is detected on a user’s device.
EDR (Endpoint Detection and Response)
A framework of policies and technologies used to manage and control user identities and access to resources within an organization.
Example: ensure only authorized users can access sensitive data based on their roles and permissions.
IAM (Identity and Access Management)
A security framework used to manage user access and actions within a network, ensuring the right users are authenticated, authorized, and their actions are logged for auditing.
Example: uses this to verify the user’s identity, grant access to resources, and track their usage for compliance.
AAA (Authentication, Authorization, and Accounting)