Golosary Deck Flashcards
Parser
A parser is a software component or program that analyzes input data (often text or code) to break it into smaller, structured parts for easier processing. It is widely used in fields like programming, natural language processing, and data analysis.
False Positives
Refers to an incorrect alert or notification generated by a security system, where a benign or legitimate action, file, or event is mistakenly identified as a threat or malicious activity. This often happens due to overly sensitive detection systems, misconfigurations, or outdated threat signatures.
False Negative
When a security system fails to detect a real threat or malicious activity, incorrectly classifying it as benign. This type of error is particularly dangerous because it allows threats to go unnoticed, leaving systems vulnerable to attacks.
Dynamic analysis
Dynamic analysis is a method of evaluating software, systems, or applications by observing their behavior during runtime. Dynamic analysis involves running the program in a controlled environment to identify bugs, vulnerabilities, or performance issues that occur during execution.
Static Analysis
Static Analysis is a method of evaluating software by examining its source code, bytecode, or intermediate code without executing the program. It is widely used in software development to identify potential issues early in the development lifecycle.
Netflow collector
A NetFlow collector is a critical component of a NetFlow monitoring system that receives, processes, and stores flow data exported from network devices like routers and switches. It is used to analyze network traffic and provide insights into bandwidth usage, traffic patterns, and potential security issues.
SIEM Collectors
SIEM collectors are components within a Security Information and Event Management (SIEM) system that gather log and event data from various sources across an organization’s IT environment. These collectors play a crucial role in centralizing data for analysis, correlation, and threat detection.
DROP
DROP rule in iptables refers to silently disallowing a connection by discarding the packet without sending any response back to the sender.
Replay attack
A replay attack is a type of network attack where an attacker intercepts valid data transmissions between two parties and fraudulently retransmits or delays them to deceive the receiver into performing unauthorized actions. The attacker does not need to decrypt the intercepted data; simply resending it can exploit the system’s trust in the original message