Glossary Part 2 Flashcards

1
Q

steganography

A

A technique for obscuring the presence of a message, often by embedding information within a file or other entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

software as a service (SaaS)

A

A cloud service model that provisions fully developed application services to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transport Layer Security virtual private network (TLS VPN)

A

Virtual private networking solution that uses digital certificates to identify, host, and establish secure tunnels for network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

role-based access control (RBAC)

A

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

secure enclave

A

CPU extensions that protect data stored in system memory so that an untrusted process cannot read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sensor (alarms)

A

A component in an alarm system that identifies unauthorized entry via infrared-, ultrasonic-, microwave-, or pressure-based detection of thermal changes or movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

self-signed certificate

A

A digital certificate that has been signed by the entity that issued it, rather than by a CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vulnerability feed

A

A synchronizable list of data and scripts used to check for vulnerabilities. Also referred to as plug-ins or network vulnerability tests (NVTs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

risk mitigation

A

The response of reducing risk to fit within an organization’s willingness to accept risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sinkhole

A

A DoS attack mitigation strategy that directs the traffic that is flooding a target IP address to a different network for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

system/process audit

A

An audit process with a wide scope, including assessment of supply chain, configuration, support, monitoring, and cybersecurity factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

state table

A

Information about sessions between hosts that is gathered by a stateful firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

serverless

A

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

under-voltage event

A

When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Under-voltage events are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from the electrical power station to a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

subject alternative name (SAN)

A

A field in a digital certificate allowing a host to be identified by multiple host names/subdomains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Trojan

A

A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

risk deterrence

A

In risk mitigation, the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

root certificate authority

A

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

service disruption

A

A type of attack that compromises the availability of an asset or business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SMiShing

A

A form of phishing that uses SMS text messages to trick a victim into revealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

serverless computing

A

Features and capabilities of a server without needing to perform server administration tasks. Serverless computing offloads infrastructure management to the cloud service provider—for example, configuring file storage capability without the requirement of first building and deploying a file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Temporal Key Integrity Protocol (TKIP)

A

The mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Sender Policy Framework (SPF)

A

A DNS record identifying hosts authorized to send mail for the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Security-Enhanced Linux (SELinux)

A

The default context-based permissions scheme provided with CentOS and Red Hat Enterprise Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

software composition analysis (SCA)

A

Tools designed to assist with identification of third-party and open-source code during software development and deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SYN flood

A

A DoS attack where the attacker sends numerous SYN requests to a target server, hoping to consume enough resources to prevent the transfer of legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

risk identification

A

Within overall risk assessment, the specific process of listing sources of risk due to threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

risk assessment

A

The process of identifying risks, analyzing them, developing a response strategy for them, and mitigating their future impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

vertical privilege escalation

A

When an attacker can perform functions that are normally assigned to users in higher roles, and often explicitly denied to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

transparent proxy

A

A server that redirects requests and responses without the client being explicitly configured to use it. Also referred to as a forced or intercepting proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Sarbanes-Oxley Act (SOX)

A

A law enacted in 2002 that dictates requirements for the storage and retention of documents relating to an organization’s financial and business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

threat

A

A potential for an entity to exercise a vulnerability (that is, to breach security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

screened subnet

A

A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

warm site

A

An alternate processing location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

video surveillance

A

Physical security control that uses cameras and recording devices to visually monitor the activity in a certain area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

security key

A

Portable HSM with a computer interface, such as USB or NFC, used for multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

supply chain

A

The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

risk transference

A

In risk mitigation, the response of moving or sharing the responsibility of risk to another entity, such as by purchasing cybersecurity insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

risk reporting

A

A periodic summary of relevant information about a project’s current risks. It provides a summarized overview of known risks, realized risks, and their impact on the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

sensor

A

A monitor that records (or “sniffs”) data from frames as they pass over network media, using methods such as a mirror port or TAP device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

web filter

A

A software application or gateway that filters client requests for various types of Internet content (web, FTP, IM, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

resource consumption

A

A potential indicator of malicious activity where CPU, memory, storage, and/or network usage deviates from expected norms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

tokenization

A

A de-identification method where a unique token is substituted for real data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

secure baseline

A

Configuration guides, benchmarks, and best practices for deploying and maintaining a network device or application server in a secure state for its given role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

workforce multiplier

A

A tool or automation that increases employee productivity, enabling them to perform more tasks to the same standard per unit of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

signature-based detection

A

A network monitoring system that uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

risk owner

A

An individual who is accountable for developing and implementing a risk response strategy for a risk documented in a risk register.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

server-side

A

In a web application, input data that is executed or validated as part of a script or process running on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

software-defined networking (SDN)

A

APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

web application firewall (WAF)

A

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

security identifier (SID)

A

The value assigned to an account by Windows and that is used by the operating system to identify that account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Transport Layer Security (TLS)

A

Security protocol that uses certificates for authentication and encryption to protect web communications and other application protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

risk analysis

A

Process for qualifying or quantifying the likelihood and impact of a factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

server-side request forgery (SSRF)

A

An attack where an attacker takes advantage of the trust established between the server and the resources it can access, including itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

salt

A

A security countermeasure that mitigates the impact of precomputed hash table attacks by adding a random value to (“salting”) each plaintext input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ticket granting ticket (TGT)

A

In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

trade secrets

A

Intellectual property that gives a company a competitive advantage but hasn’t been registered with a copyright, trademark, or patent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

rule-based access control

A

A nondiscretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

spyware

A

Software that records information about a PC and its users, often installed without the user’s consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

risk acceptance

A

The response of determining that a risk is within the organization’s appetite and no countermeasures other than ongoing monitoring is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

trusted platform module (TPM)

A

Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

virtual private cloud (VPC)

A

A private network segment made available to a single cloud consumer on a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

statement of work (SOW)

A

A document that defines the expectations for a specific business arrangement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

security information and event management (SIEM)

A

A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

user and entity behavior analytics (UEBA)

A

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

service level agreement (SLA)

A

An agreement that sets the service requirements and expectations between a consumer and a provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Virtual Network Computing (VNC)

A

Remote access tool and protocol. VNC is the basis of macOS screen sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

static analysis

A

The process of reviewing uncompiled source code either manually or using automated tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

simulation (testing)

A

A testing technique that replicates the conditions of a real-world disaster scenario or security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

resilience

A

The ability of a system or network to recover quickly from failure events with no or minimal manual intervention.

72
Q

security log

A

A target for event data related to access control, such as user authentication and privilege use.

73
Q

vulnerability scanner

A

Hardware or software configured with a list of known weaknesses and exploits and that can scan for their presence in a host OS or particular application.

74
Q

threat hunting

A

A cybersecurity technique designed to detect the presence of threats that have not been discovered by normal security monitoring.

75
Q

Simultaneous Authentication of Equals (SAE)

A

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

76
Q

risk threshold

A

Boundary for types and/or levels of risk that can be accepted.

77
Q

watering hole attack

A

An attack in which an attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites.

78
Q

single sign-on (SSO)

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

79
Q

responsibility matrix

A

Identifies that responsibility for the implementation of security as applications, data, and workloads are transitioned into a cloud platform are shared between the customer and the cloud service provider (CSP).

80
Q

snapshot (backup)

A

Used to create the entire architectural instance/copy of an application, disk, or system. It is used in backup processes to restore the system or disk of a particular device at a specific time. A snapshot backup can also be referred to as image backup.

81
Q

virtual private network (VPN)

A

A secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

82
Q

worm

A

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

83
Q

risk register

A

A document highlighting the results of risk assessments in an easily comprehensible format (such as a “traffic light” grid). Its purpose is for department managers and technicians to understand risks associated with the workflows that they manage.

84
Q

risk exception

A

Category of risk management that uses alternate mitigating controls to control an accepted risk factor.

85
Q

tunneling

A

The practice of encapsulating data from one protocol for safe transfer over another network such as the Internet.

86
Q

vishing

A

Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

87
Q

single loss expectancy (SLE)

A

The amount that would be lost in a single occurrence of a particular risk factor.

88
Q

Secure Shell (SSH)

A

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

89
Q

scalability

A

Property by which a computing environment is able to gracefully fulfill its ever-increasing resource needs.

90
Q

sandbox

A

A computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.

91
Q

uninterruptible power supply (UPS)

A

A battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

92
Q

transport/communication encryption

A

Encryption scheme applied to data-in-motion, such as WPA, IPsec, or TLS.

93
Q

third-party risks

A

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.

94
Q

risk exemption

A

Category of risk management that accepts an unmitigated risk factor.

95
Q

supervisory control and data acquisition (SCADA)

A

A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas from a host computer.

96
Q

resource inaccessibility

A

A potential indicator of malicious activity where a file or service resource that should be available is inaccessible.

97
Q

Secure File Transfer Protocol (SFTP)

A

A secure version of the File Transfer Protocol that uses a Secure Shell (SSH) tunnel as an encryption method to transfer, access, and manage files.

98
Q

self-encrypting drive (SED)

A

A disk drive where the controller can automatically encrypt data that is written to it.

99
Q

write blocker

A

A forensic tool to prevent the capture or analysis device or workstation from changing data on a target disk or media.

100
Q

work recovery time (WRT)

A

In disaster recovery, time additional to the RTO of individual systems to perform reintegration and testing of a restored or upgraded system following an event.

101
Q

Simple Network Management Protocol (SNMP)

A

Application protocol used for monitoring and managing network devices. SNMP works over UDP ports 161 and 162 by default.

102
Q

Wired Equivalent Privacy (WEP)

A

A legacy mechanism for encrypting data sent over a wireless connection.

103
Q

supplicant

A

In EAP architecture, the device requesting access to the network.

104
Q

sanitization

A

The process of thoroughly and completely removing data from a storage medium so that file remnants cannot be recovered.

105
Q

service set identifier (SSID)

A

A character string that identifies a particular wireless LAN (WLAN).

106
Q

soft authentication token

A

OTP sent to a registered number or email account or generated by an authenticator app as a means of two-step verification when authenticating account access.

107
Q

responsiveness

A

The ability of a system to process a task or workload within an acceptable amount of time.

108
Q

security control

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

109
Q

tabletop exercise

A

A discussion of simulated emergency situations and security incidents.

110
Q

Simple Object Access Protocol (SOAP)

A

An XML-based web services protocol that is used to exchange messages.

111
Q

time-of-day restrictions

A

Policies or configuration settings that limit a user’s access to resources.

112
Q

third party CA

A

In PKI, a public CA that issues certificates for multiple domains and is widely trusted as a root trust by operating systems and browsers.

113
Q

test access point (TAP)

A

A hardware device inserted into a cable run to copy frames for analysis.

114
Q

threat actor

A

A person or entity responsible for an event that has been identified as a security incident or as a risk.

115
Q

software bill of materials (SBOM)

A

Inventory of third-party and open-source code components used in an application or package.

116
Q

risk

A

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

117
Q

tethering

A

Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot).

118
Q

timeline

A

In digital forensics, a tool that shows the sequence of file system events within a source image in a graphical format.

119
Q

shadow IT

A

Computer hardware, software, or services used on a private network without authorization from the system owner.

120
Q

zero trust

A

The security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed.

121
Q

Wi-Fi Protected Access (WPA)

A

Standards for authenticating and encrypting access to Wi-Fi networks.

122
Q

secure hash algorithm (SHA)

A

A cryptographic hashing algorithm created to address possible weaknesses in MDA. The current version is SHA-2.

123
Q

uniform resource locator (URL)

A

An application-level addressing scheme for TCP/IP, allowing for human-readable resource addressing. For example: protocol://server/file, where “protocol” is the type of resource (HTTP, FTP), “server” is the name of the computer (www.microsoft.com), and “file” is the name of the resource you wish to access.

124
Q

security assertion markup language (SAML)

A

An XML-based data format used to exchange authentication information between a client and a service.

125
Q

social engineering

A

An activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.

126
Q

virtualization

A

A computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.

127
Q

rooting

A

Gaining superuser-level access over an Android-based mobile device.

128
Q

System Monitor

A

Software that tracks the health of a computer’s subsystems using metrics reported by system hardware or sensors. This provides an alerting service for faults such as high temperature, chassis intrusion, and so on.

129
Q

reverse proxy

A

A type of proxy server that protects servers from direct contact with client requests.

130
Q

resources/funding

A

The ability of threat actors to draw upon funding to acquire personnel, tools, and to develop novel attack types.

131
Q

visualization

A

A widget showing records or metrics in a visual format, such as a graph or table.

132
Q

site survey

A

Documentation about a location for the purposes of building an ideal wireless infrastructure; it often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and identify sources of interference.

133
Q

Security Content Automation Protocol (SCAP)

A

A NIST framework that outlines various accepted practices for automating vulnerability scanning.

134
Q

syslog

A

Application protocol and event-logging format enabling different appliances and software applications to transmit logs or event records to a central server. Syslog works over UDP port 514 by default.

135
Q

standards

A

Expected outcome or state of a task that has been performed in accordance with policies and procedures. Standards can be determined internally or measured against external frameworks.

136
Q

risk appetite

A

A strategic assessment of what level of residual risk is acceptable for an organization.

137
Q

stateful inspection

A

A technique used in firewalls to analyze packets down to the application layer rather than filtering packets only by header information, enabling the firewall to enforce tighter and more security.

138
Q

rules of engagement (ROE)

A

A definition of how a pen test will be executed and what constraints will be in place. This provides the pen tester with guidelines to consult as they conduct their tests so that they don’t have to constantly ask management for permission to do something.

139
Q

Simple Mail Transfer Protocol (SMTP)

A

Application protocol used to send mail between hosts on the Internet. Messages are sent between servers over TCP port 25 or submitted by a mail client over secure port TCP/587.

140
Q

risk avoidance

A

In risk mitigation, the practice of ceasing activity that presents risk.

141
Q

security zone

A

An area of the network (or of a connected network) where the security configuration is the same for all hosts within it. In physical security, an area separated by barriers that control entry and exit points.

142
Q

Structured Query Language injection (SQL injection)

A

An attack that injects a database query into the input data directed at a server by accessing the client side of the application.

143
Q

software defined WAN (SD-WAN)

A

Services that use software-defined mechanisms and routing policies to implement virtual tunnels and overlay networks over multiple types of transport network.

144
Q

Snort

A

An open source NIDS. A subscription (“oinkcode”) is required to obtain up-to-date rulesets, which allow the detection engine to identify the very latest threats. Non-subscribers can obtain community-authored rulesets.

145
Q

standard configurations

A

In an IaC architecture, the property that an automation or orchestration action always produces the same result, regardless of the component’s previous state.

146
Q

root cause analysis

A

A technique used to determine the true cause of the problem that, when removed, prevents the problem from occurring again.

147
Q

selection of effective controls

A

The process of choosing the type and placement of security controls to ensure the goals of the CIA triad and compliance with any framework requirements.

148
Q

sideloading

A

Installing an app to a mobile device without using an app store.

149
Q

risk tolerance

A

Determines the thresholds that separate different levels of risk.

150
Q

smart card

A

A security device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded cryptoprocessor.

151
Q

single point of failure (SPoF)

A

A component or system that would cause a complete interruption of a service if it failed.

152
Q

wildcard domain

A

In PKI, a digital certificate that will match multiple subdomains of a parent domain.

153
Q

Wi-Fi Protected Setup (WPS)

A

A feature of WPA and WPA2 that allows enrollment in a wireless network based on an eight-digit PIN.

154
Q

unsecure network

A

Configuration that exposes a large attack surface, such as through unnecessary open service ports, weak or no authentication, use of default credentials, or lack of secure communications/encryption.

155
Q

version control

A

The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes.

156
Q

shellcode

A

A lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system.

157
Q

virus

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

158
Q

session affinity

A

A scheduling approach used by load balancers to route traffic to devices that have already established connections with the client in question.

159
Q

risk management

A

The cyclical process of identifying, assessing, analyzing, and responding to risks.

160
Q

trend analysis

A

The process of detecting patterns within a dataset over time, and using those patterns to make predictions about future events or to better understand past events.

161
Q

unified threat management (UTM)

A

All-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data-loss prevention, content filtering, and so on.

162
Q

typosquatting

A

An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker’s website.

163
Q

responsible disclosure program

A

A process that allows researchers and reviewers to safely disclose vulnerabilities to a software developer.

164
Q

tactics, techniques, and procedures (TTP)

A

Analysis of historical cyberattacks and adversary actions.

165
Q

structured exception handler (SEH)

A

A mechanism to account for unexpected error conditions that might arise during code execution. Effective error handling reduces the chances that a program could be exploited.

166
Q

technical debt

A

Costs accrued by keeping an ineffective system or product in place, rather than replacing it with a better-engineered one.

167
Q

router firewall

A

A hardware device that has the primary function of a router, but also has firewall functionality embedded into the router firmware.

168
Q

threat feed

A

Signatures and pattern-matching rules supplied to analysis platforms as an automated feed.

169
Q

software development life cycle (SDLC)

A

The processes of planning, analysis, design, implementation, and maintenance that often govern software and systems development.

170
Q

time-of-check to time-of-use (TOCTOU)

A

The potential vulnerability that occurs when there is a change between when an app checked a resource and when the app used the resource.

171
Q

unintentional insider threat

A

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

172
Q

right to be forgotten

A

Principle of regulated privacy data that protects the data subject’s ability to request its deletion.

173
Q

type-safe programming language

A

A program that enforces strict type-checking during compilation and ensures variables and data are used correctly. It prevents memory-related vulnerabilities and injection attacks.

174
Q

virtual local area network (VLAN)

A

A logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID. Even though hosts on two VLANs may be physically connected to the same switch, local traffic is isolated to each VLAN, so they must use a router to communicate.

175
Q

Secure Access Service Edge (SASE)

A

A networking and security architecture that provides secure access to cloud applications and services while reducing complexity. It combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN.

176
Q

zero-day

A

A vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.

177
Q

skimming

A

Making a duplicate of a contactless access card by copying its access token and programming a new card with the same data.