intro Flashcards
the process of gathering information about an organization, including: system hardware information; network configurations; and individual user information
Reconnaissance
when a system’s defenses are penetrated; and unauthorized access is gained.
Breach
when unknown additional rights are configured to a users account
escalate privileges
This process of preparing a computer to perform additional tasks during an attack, such as installing software designed to attach other systems.
Staging
taking advantage of known vulnerabilities in software and systems
Exploit
the implementation of multiple security measures to protect the same asset
Layering
users or groups are given only the access they need to do their jobs.
principle of least privilege
the constant changing of personal habits and passwords to prevent anticipated events and exploration
Randomness
a relationships that flows among multiple domains
transitive trust
a relationship explicit between domains
non-transitive trust