Incorrect Domains Flashcards
Worms
“Replicate” and “Spread”
.12
Fileless Scripts
executing malicious activity while legit programs run.
Memory based not file based
1.2
Logic Bomb
if discovered its already too late
1.2
Rootkit
- Distributed privilege access for a remote user which gives them admin privileges
1.2
Rainbow Table
Rebuilt set of hashes used to crack a password
1.3
Salting
adding additional random data to the password to prevent rainbow table
1.3
Skimming
attaching a fake scanner to a POS system
1.4
Criminal Syndicates
Financial backing and a structure threat conducted over a long period of time
1.5
Shadow IT
The use of IT, devices and sopftware without explicit IT department approval, often done with good intentions
1.5
Adversaries
government funded agencies
1.7
Bulletins
released by vendors or private companies
1.7
False Negative
When there is a vulnerability, but the scanner does not detect it
1.8
Credentialed scan
spots vulnerabilities like non expiring passwords
1.8
True Positive
results of the system scan agree with the manual inspection
1.8
non credentialed scan
Lower privileges than a credentialed scan. find missing patches and some protocol vulnerabilities
1.8
Intrusive Scan
try to exploit vulnerability and should be done in a sandbox
1.8
SIEM
Security Information Event Management
provides real time monitoring, analysis, correlation and notification of potential attacks
Built in log collector like syslog
1.8
SOAR
centralized alert and response automation with threat specific playbooks
1.8
Dashboard
SIEM typically includes a dashboard and collects reports that can be reviewed regularly to ensure that the polices have been enforced and the environment is compliant
1.8
UEBA
User Entity Behavior Analysis
based on the interaction of the user that focuses on their identity data that they would normally access on a normal day
Tracks devices that the user normally uses and the servers that they normally visit
1.8
Pivoting
a compromised system is used to attack another system on the same network
1.8
IaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
Ex. Azure Virutal Machines
2.2 Summarize Virtualization and Cloud Computing Concepts
PaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
- OS
- Middleware
- Runtime
Customer is responsible for deployment and management of apps
CSP manages provisioning of configuration, hardware, and OS
Ex. Azure SQL database, API management
2.2 Summarize Virtualization and Cloud Computing Concepts
SaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
- OS
- Middleware
- Runtime
Customer just configures features. Limited shared responsibility for Applications and Data
CSP responsible for management, operation, and service availability
Office365, SalesForce
2.2 Summarize Virtualization and Cloud Computing Concepts
Containerization
a lightweight, granular and portable way to package applications for multiple platforms
2.2 Summarize Virtualization and Cloud Computing Concepts
IaC
Infrastructure as Code
management of infrastructure (networks, VM, load balancers and topology) described in code
Used in conjunction with continuous integration and continuous delivery
2.2 Summarize Virtualization and Cloud Computing Concepts
SDN
Sofware Defined Networks
Network controlled using software. Separating the control plane from the data plane opens up security challenges that can include a DoS or Man in the middle attack
2.2 Summarize Virtualization and Cloud Computing Concepts
Smart Card
a credit card sized token that contains a certificate and is used for authentication in conjuction with a pin
2.4 Summarize authentication and authorization design concepts
Attestation
the process of confirming the device is an approved device compliant with the company policies. Remote attestation involves checks that occur on a local device and are reported to a verification server (as with an MDM solution)
2.4 Summarize authentication and authorization design concepts
Directory Services
used to store and manage information about objects, such as user accounts, mail accounts and information on resources. LDAP is a common one
2.4 Summarize authentication and authorization design concepts
Federation
collection of domains that have established trust
2.4 Summarize authentication and authorization design concepts
something you have
trusted device
Something you know
pin or password
something you are
biometric
RADIUS
uses UDP and ecnrypts the password only
2.4 Summarize authentication and authorization design concepts
TACACS+
Uses TCP and encrypts the entire password
2.4 Summarize authentication and authorization design concepts
RAID Levels
increases performance of data storage with two or more drives working in Parallel
RAID 0 - striping
RAID 1 - mirroring
RAID 5 - striping with parity
RAID 6 - striping with double parity
RAID 10 - combining mirroring and striping
2.5 Implement Security Resilience
Load Balancers
balances traffic across multiple servers, often used for web traffic
2.5 Implement Security Resilience
Storage Area Network (SAN)
hardware device that contains large number of disks, such as SSDs, usually isolated from the LAN
2.5 Implement Security Resilience
RTO
Maximum amount of time that a process or service is allowed to be down
2.5 Implement Security Resilience