Glossary Flashcards

1
Q

Access Control List

A

A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Directory

A

The core identity store and authentication, authorization, and accounting service for many Windows-centric organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Monitoring

A

A technique that reaches out to remote systems and devices to gather data about availability, routes, packet delay or loss, and bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Reconnaissance

A

A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Persistent Threat

A

A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adverse Event

A

An event that has negative consequences, such as a malware infection on a system, a server crash, and users accessing a file, which they are not authorized to view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Analysis Utility

A

A utility that provides a number of useful capabilities that can offer insight into what occurred on a system, such as Windows Registry analysis, timelines of system changes, validation tools, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attrition

A

An attack that employs brute-force methods to compromise, degrade, or destroy systems, networks, or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Metric

A

The Common Vulnerability Scoring System ( CVSS ) metric that describes a validation barrier, which is required to be removed by an attacker to exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability

A

A cybersecurity objective that ensures information and systems are accessible to authorized users at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Beaconing

A

An activity sent to a command and control system as part of a botnet or a malware remote control system and is sent as either a HTTP or HTTPS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Buffer Overflow

A

An attack that occurs when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clear

A

A media sanitization option that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple noninvasive data recovery techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Closed source intelligence

A

A finding that is obtained through private sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Platform Enumeration

A

The Security Content Automation Protocol standard that provides a standard nomenclature for describing product names and versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Vulnerability Scoring System

A

The Security Content Automation Protocol standard that provides a standardized approach for measuring and describing the severity of security-related software flaws

17
Q

Containerization

A

The technology that allows the virtualization of a runtime environment such that the cloud customer can install or operate an application without needing an entire virtual machine or operating system

18
Q

Control Objectives for Information and Related Technologies COBIT

A

A set of best practices for IT governance developed by the Information Systems Audit and Control Association ISACA

19
Q

Cross Site Scripting XSS

A

An attack in which an attacker embeds scripting commands on a website that will later be executed by an unsuspecting visitor accessing that website

20
Q

Degaussing

A

A form of purging that uses extremely strong magnetic fields to disrupt stored data on a device

21
Q

DMZ

A

A special network zone designed to house systems that receive connections from the outside world

22
Q

Diamond Model of Intrusion Analysis

A

A model that describes a sequence where an adversary deploys a capability targeted at the infrastructure against a victim

23
Q

Domain Keys Identified Mail

A

An email authentication method designed to detect forged sender addresses in emails

24
Q

Evidence production procedure

A

A procedure that describes how an organization will respond to subpoenas, court orders, and other legitimate requests to produce digital evidence

25
Q

Fagan inspection

A

A form of structured and formal code review intended to find a variety of problems during the development process of a product

26
Q

Federal Information Security Management Act

FISMA

A

An act that requires government agencies and other organizations operating systems on behalf of government agencies to comply with a series of security standards

27
Q

File Carving

A

A process of extracting data from a computer when that data has no associated file system metadata

28
Q

Fuzzing

A

An automated testing technique in which a range of inputs is provided to software to look for problems such as buffer overflows, crashes, unexpected behavior, and so forth

29
Q

Gramm-Leach-Bliley Act

GLBA

A

An act that governs how financial institutions may handle customer financial records

30
Q

Guideline

A

A principle that provides best practices and recommendations related to a given concept, technology, or task.

31
Q

Health Insurance Portability and Accountability Act

HIPAA

A

An act or regulation that includes security and privacy rules that affect healthcare providers, health insurers, and health information clearing houses

32
Q

Hypervisor

A

A piece of software that enables virtualization on a computer

33
Q

Incident Response

A

An organized approach to address and manage the aftermath of a security breach or cyberattack

34
Q

Information Technology Infrastructure Library

ITIL

A

A set of IT management practices for aligning IT services with the needs of the business

35
Q

Internet of Things

A

A general term for TCP/IP capable devices that provides limited sets of functions

36
Q

Kerberos

A

A computer network authentication protocol that uses tickets to allow nodes and users to communicate over an insecure network to prove their identity

37
Q

Nagios

A

A popular network and a system log monitoring tool that supports a broad range of plug-ins