Glossary Flashcards
(37 cards)
Access Control List
A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.
Active Directory
The core identity store and authentication, authorization, and accounting service for many Windows-centric organizations.
Active Monitoring
A technique that reaches out to remote systems and devices to gather data about availability, routes, packet delay or loss, and bandwidth.
Active Reconnaissance
A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.
Advanced Persistent Threat
A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.
Adverse Event
An event that has negative consequences, such as a malware infection on a system, a server crash, and users accessing a file, which they are not authorized to view.
Analysis Utility
A utility that provides a number of useful capabilities that can offer insight into what occurred on a system, such as Windows Registry analysis, timelines of system changes, validation tools, and so on.
Attrition
An attack that employs brute-force methods to compromise, degrade, or destroy systems, networks, or services.
Authentication Metric
The Common Vulnerability Scoring System ( CVSS ) metric that describes a validation barrier, which is required to be removed by an attacker to exploit a vulnerability.
Availability
A cybersecurity objective that ensures information and systems are accessible to authorized users at all times.
Beaconing
An activity sent to a command and control system as part of a botnet or a malware remote control system and is sent as either a HTTP or HTTPS protocol.
Buffer Overflow
An attack that occurs when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.
Clear
A media sanitization option that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple noninvasive data recovery techniques
Closed source intelligence
A finding that is obtained through private sources
Common Platform Enumeration
The Security Content Automation Protocol standard that provides a standard nomenclature for describing product names and versions
Common Vulnerability Scoring System
The Security Content Automation Protocol standard that provides a standardized approach for measuring and describing the severity of security-related software flaws
Containerization
The technology that allows the virtualization of a runtime environment such that the cloud customer can install or operate an application without needing an entire virtual machine or operating system
Control Objectives for Information and Related Technologies COBIT
A set of best practices for IT governance developed by the Information Systems Audit and Control Association ISACA
Cross Site Scripting XSS
An attack in which an attacker embeds scripting commands on a website that will later be executed by an unsuspecting visitor accessing that website
Degaussing
A form of purging that uses extremely strong magnetic fields to disrupt stored data on a device
DMZ
A special network zone designed to house systems that receive connections from the outside world
Diamond Model of Intrusion Analysis
A model that describes a sequence where an adversary deploys a capability targeted at the infrastructure against a victim
Domain Keys Identified Mail
An email authentication method designed to detect forged sender addresses in emails
Evidence production procedure
A procedure that describes how an organization will respond to subpoenas, court orders, and other legitimate requests to produce digital evidence