Glossary Flashcards
Access Control List
A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.
Active Directory
The core identity store and authentication, authorization, and accounting service for many Windows-centric organizations.
Active Monitoring
A technique that reaches out to remote systems and devices to gather data about availability, routes, packet delay or loss, and bandwidth.
Active Reconnaissance
A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.
Advanced Persistent Threat
A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.
Adverse Event
An event that has negative consequences, such as a malware infection on a system, a server crash, and users accessing a file, which they are not authorized to view.
Analysis Utility
A utility that provides a number of useful capabilities that can offer insight into what occurred on a system, such as Windows Registry analysis, timelines of system changes, validation tools, and so on.
Attrition
An attack that employs brute-force methods to compromise, degrade, or destroy systems, networks, or services.
Authentication Metric
The Common Vulnerability Scoring System ( CVSS ) metric that describes a validation barrier, which is required to be removed by an attacker to exploit a vulnerability.
Availability
A cybersecurity objective that ensures information and systems are accessible to authorized users at all times.
Beaconing
An activity sent to a command and control system as part of a botnet or a malware remote control system and is sent as either a HTTP or HTTPS protocol.
Buffer Overflow
An attack that occurs when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.
Clear
A media sanitization option that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple noninvasive data recovery techniques
Closed source intelligence
A finding that is obtained through private sources
Common Platform Enumeration
The Security Content Automation Protocol standard that provides a standard nomenclature for describing product names and versions