Glossary Part 2 Flashcards
steganography
A technique for obscuring the presence of a message, often by embedding information within a file or other entity.
software as a service (SaaS)
A cloud service model that provisions fully developed application services to users.
Transport Layer Security virtual private network (TLS VPN)
Virtual private networking solution that uses digital certificates to identify, host, and establish secure tunnels for network traffic.
role-based access control (RBAC)
An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.
secure enclave
CPU extensions that protect data stored in system memory so that an untrusted process cannot read it.
sensor (alarms)
A component in an alarm system that identifies unauthorized entry via infrared-, ultrasonic-, microwave-, or pressure-based detection of thermal changes or movement.
self-signed certificate
A digital certificate that has been signed by the entity that issued it, rather than by a CA.
vulnerability
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
vulnerability feed
A synchronizable list of data and scripts used to check for vulnerabilities. Also referred to as plug-ins or network vulnerability tests (NVTs).
risk mitigation
The response of reducing risk to fit within an organization’s willingness to accept risk.
sinkhole
A DoS attack mitigation strategy that directs the traffic that is flooding a target IP address to a different network for analysis.
system/process audit
An audit process with a wide scope, including assessment of supply chain, configuration, support, monitoring, and cybersecurity factors.
state table
Information about sessions between hosts that is gathered by a stateful firewall.
serverless
A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.
under-voltage event
When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Under-voltage events are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from the electrical power station to a building.
subject alternative name (SAN)
A field in a digital certificate allowing a host to be identified by multiple host names/subdomains.
Trojan
A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
risk deterrence
In risk mitigation, the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario.
root certificate authority
In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.
service disruption
A type of attack that compromises the availability of an asset or business process.
SMiShing
A form of phishing that uses SMS text messages to trick a victim into revealing information.
serverless computing
Features and capabilities of a server without needing to perform server administration tasks. Serverless computing offloads infrastructure management to the cloud service provider—for example, configuring file storage capability without the requirement of first building and deploying a file server.
Temporal Key Integrity Protocol (TKIP)
The mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.
Sender Policy Framework (SPF)
A DNS record identifying hosts authorized to send mail for the domain.
Security-Enhanced Linux (SELinux)
The default context-based permissions scheme provided with CentOS and Red Hat Enterprise Linux.
software composition analysis (SCA)
Tools designed to assist with identification of third-party and open-source code during software development and deployment.
SYN flood
A DoS attack where the attacker sends numerous SYN requests to a target server, hoping to consume enough resources to prevent the transfer of legitimate traffic.
risk identification
Within overall risk assessment, the specific process of listing sources of risk due to threats and vulnerabilities.
risk assessment
The process of identifying risks, analyzing them, developing a response strategy for them, and mitigating their future impact.
vertical privilege escalation
When an attacker can perform functions that are normally assigned to users in higher roles, and often explicitly denied to the attacker.
transparent proxy
A server that redirects requests and responses without the client being explicitly configured to use it. Also referred to as a forced or intercepting proxy.
Sarbanes-Oxley Act (SOX)
A law enacted in 2002 that dictates requirements for the storage and retention of documents relating to an organization’s financial and business operations.
threat
A potential for an entity to exercise a vulnerability (that is, to breach security).
screened subnet
A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.
warm site
An alternate processing location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed.
video surveillance
Physical security control that uses cameras and recording devices to visually monitor the activity in a certain area.
security key
Portable HSM with a computer interface, such as USB or NFC, used for multifactor authentication.
supply chain
The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer.
risk transference
In risk mitigation, the response of moving or sharing the responsibility of risk to another entity, such as by purchasing cybersecurity insurance.
risk reporting
A periodic summary of relevant information about a project’s current risks. It provides a summarized overview of known risks, realized risks, and their impact on the organization.
sensor
A monitor that records (or “sniffs”) data from frames as they pass over network media, using methods such as a mirror port or TAP device.
web filter
A software application or gateway that filters client requests for various types of Internet content (web, FTP, IM, and so on).
resource consumption
A potential indicator of malicious activity where CPU, memory, storage, and/or network usage deviates from expected norms.
tokenization
A de-identification method where a unique token is substituted for real data.
secure baseline
Configuration guides, benchmarks, and best practices for deploying and maintaining a network device or application server in a secure state for its given role.
workforce multiplier
A tool or automation that increases employee productivity, enabling them to perform more tasks to the same standard per unit of time.
signature-based detection
A network monitoring system that uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable.
risk owner
An individual who is accountable for developing and implementing a risk response strategy for a risk documented in a risk register.
server-side
In a web application, input data that is executed or validated as part of a script or process running on the server.
software-defined networking (SDN)
APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.
web application firewall (WAF)
A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.
security identifier (SID)
The value assigned to an account by Windows and that is used by the operating system to identify that account.
Transport Layer Security (TLS)
Security protocol that uses certificates for authentication and encryption to protect web communications and other application protocols.
risk analysis
Process for qualifying or quantifying the likelihood and impact of a factor.
server-side request forgery (SSRF)
An attack where an attacker takes advantage of the trust established between the server and the resources it can access, including itself.
salt
A security countermeasure that mitigates the impact of precomputed hash table attacks by adding a random value to (“salting”) each plaintext input.
ticket granting ticket (TGT)
In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.
trade secrets
Intellectual property that gives a company a competitive advantage but hasn’t been registered with a copyright, trademark, or patent.
rule-based access control
A nondiscretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.
spyware
Software that records information about a PC and its users, often installed without the user’s consent.
risk acceptance
The response of determining that a risk is within the organization’s appetite and no countermeasures other than ongoing monitoring is needed.
trusted platform module (TPM)
Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.
virtual private cloud (VPC)
A private network segment made available to a single cloud consumer on a public cloud.
statement of work (SOW)
A document that defines the expectations for a specific business arrangement.
security information and event management (SIEM)
A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.
user and entity behavior analytics (UEBA)
A system that can provide automated identification of suspicious activity by user accounts and computer hosts.
service level agreement (SLA)
An agreement that sets the service requirements and expectations between a consumer and a provider.
Virtual Network Computing (VNC)
Remote access tool and protocol. VNC is the basis of macOS screen sharing.
static analysis
The process of reviewing uncompiled source code either manually or using automated tools.
simulation (testing)
A testing technique that replicates the conditions of a real-world disaster scenario or security incident.