Glossary J-K-L-M Flashcards

1
Q

jamming

A

An attack in which radio waves disrupt 802.11 wireless signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

job rotation

A

The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

jump server

A

A hardened server that provides access to other hosts. Also known as jumpbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerberos

A

A single sign-on authentication and authorization service that is based on a time-sensitive ticket-granting system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

keylogger

A

Malicious software or hardware that can record user keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

kill chain

A

A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

L2TP (Layer 2 Tunneling Protocol)

A

VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

lateral movement

A

The process by which an attacker is able to move from one part of a computing environment to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LDAP (Lightweight Directory Access Protocol)

A

A network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LDAP injection

A

An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAPS (Lightweight Directory Access Protocol Secure)

A

A method of implementing LDAP using SSL/TLS encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LEAP (Lightweight Extensible Authentication Protocol)

A

Cisco Systems’ proprietary EAP implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

least privilege

A

A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

lightweight cryptography

A

Cryptographic algorithms with reduced compute requirements that are suitable for use in resource-constrained environments, such as battery-powered devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LLR (lessons learned report)

A

An analysis of events that can provide insight into how to improve response processes in the future. Also known as after action report or AAR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

load balancer

A

A type of switch or router that distributes client requests between different resources, such as communications links or similarly-configured servers. This provides fault tolerance and improves throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

logger command

A

Linux utility that writes data to the system log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

logic bomb

A

A malicious program or script that is set to run under particular circumstances or in response to a defined event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

loop protection

A

If broadcast traffic is allowed to continually loop around a network, the number of broadcast packets increases exponentially, crashing the network. Loop protection in switches (such as Spanning Tree Protocol), and in routers (Time To Live for instance) is designed to prevent this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MaaS (monitoring as a service)

A

Cloud service providing ongoing security and availability monitoring of on-premises and/or cloud-based hosts and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MAC (Mandatory Access Control)

A

Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC (Message Authentication Code)

A

Proving the integrity and authenticity of a message by combining its hash with a shared secret.

23
Q

MAC cloning (Media Access Control cloning)

A

An attack in which an attacker falsifies the factory-assigned MAC address of a device’s network interface. Also known as MAC spoofing.

24
Q

MAC filtering (Media Access Control filtering)

A

Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.

25
Q

MAC flooding

A

A variation of an ARP poisoning attack where a switch’s cache table is inundated with frames from random source MAC addresses.

26
Q

MAM (mobile application management)

A

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.

27
Q

managerial control

A

A category of security control that gives oversight of the information system.

28
Q

mandatory vacations

A

The principle that states when and how long an employee must take time off from work so that their activities may be subjected to a security review.

29
Q

maneuver

A

In threat hunting, the concept that threat actor and defender may use deception or counterattacking strategies to gain positional advantage.

30
Q

mantrap (access control vestibule)

A

A secure entry system with two gateways, only one of which is open at any one time.

31
Q

MD5 (Message Digest Algorithm v5)

A

A cryptographic hash function producing a 128-bit output.

32
Q

MDM (mobile device management)

A

The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

33
Q

measured boot

A

A UEFI feature that gathers secure metrics to validate the boot process in an attestation report.

34
Q

MEF (mission essential function)

A

A business or organizational activity that is too critical to be deferred for anything more than a few hours, if at all.

35
Q

memdump command

A

Linux utility developed as part of the Coroner’s Toolkit to dump system memory data to a file.

36
Q

memory leak

A

A software vulnerability that can occur when software does not release allocated memory when it is done using it, potentially leading to system instability.

37
Q

metadata

A

Information stored or recorded as a property of an object, state of a system, or transaction.

38
Q

MFA (multifactor authentication)

A

An authentication scheme that requires the user to present at least two different factors as credentials, from something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.

39
Q

microservices

A

A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology.

40
Q

mirroring

A

A type of RAID that using two hard disks, providing the simplest way of protecting a single disk against failure. Data is written to both disks and can be read from either disk.

41
Q

MitB attack (Man-in-the-Browser attack)

A

An attack when the web browser is compromised by installing malicious plug-ins or scripts, or intercepting API calls between the browser process and DLLs.

42
Q

MitM attack (Man-in-the-Middle attack)

A

A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently.

43
Q

MMS (multimedia messaging service)

A

Extension to SMS allowing digital data (picture, video, or audio) to be sent over a cellular data connection.

44
Q

mode of operation

A

Implementation of a block symmetric cipher, with some modes allowing secure encryption of a stream of data, with or without authentication for each block.

45
Q

MoU (memorandum of understanding)

A

Usually a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve the exchange of money.

46
Q

MPLS (Multiprotocol Label Switching)

A

Developed by Cisco from ATM as a means of providing traffic engineering (congestion control), Class of Service, and Quality of Service within a packet switched, rather than circuit switched, network.

47
Q

MSA (measurement systems analysis)

A

Evaluates the data collection and statistical methods used by a quality management process to ensure they are robust.

48
Q

MSSP (managed security service provider)

A

Third-party provision of security configuration and monitoring as an outsourced service.

49
Q

MTBF (mean time between failures)

A

The rating on a device or component that predicts the expected time between failures.

50
Q

MTD (maximum tolerable downtime)

A

The longest period of time a business can be inoperable without causing irrevocable business failure.

51
Q

MTTF (mean time to failure)

A

The average time a device or component is expected to be in operation.

52
Q

MTTR (mean time to repair/replace/recover)

A

The average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure.

53
Q

multi-cloud

A

A cloud deployment model where the cloud consumer uses multiple public cloud services.

54
Q

multipath

A

Overprovisioning controllers and cabling so that a host has failover connections to storage media.