July 2024 Flashcards
URDF
Unified Robotic Description Format
Contains info about a platform (useful for high level understanding by the user)
Kinematics
Dynamics
Visual & Collision Properties
Sensors & Actuators
Modularity & Reusability
Basically the USD of Robotics
STIG
Security Technical Implementation Guide
DISA STIG is a popular one (Defense Information Systems Agency)
Ansible
An open source IT automation engine that automates provisioning, configuration management, application deployment, orchestration, and other IT stuff.
Ansible vs. bash?
Bash: Do a thing - describes an action.
Ansible: Set a state - describes the state, then is capable of generating the necessary action(s)
ClamAV
Anti-virus software for Linux
Bitdefender
Anti-virus software for Linux
Discontinued the Home Linux, moved to pay.
OSSEC
Open Source SECurity
Host-base Intrusion Detection System (HIDS)
Rootkit Detection
Active Response
Log Based Intrusion Detection
File Integrity Monitoring
System Inventory
HIDS
Host Intrusion Detection System
NIDS
Network Intrusion Detection System
SNORT
open source Intrusion Prevention System (IPS)
series of rules -> help define malicious network activity
use rules to detect packets that match -> User alert
IPS
Intrusion Prevention System
rootkit
The worst kind of malware
Kernel parasite (or hidden really deep)
Metasploitable
A version of Linux that is purposefully made vulnerable for the purpose of testing
OpenSCAP
Configuration Checker
Security
Content
Automation
Protocol
Lynis
POSIX security suite. Extensive health scan.
Security Auditing
Compliance Testing
Penetration Testing
Vulnerability Detection
System Hardening
AIDE
Advanced Intrusion Detection Environment
Open Source HIDS (Host-based Intrusion Detection System)
Nmap
The Network Mapper - Free Security Scanner
scan networks for hosts/services/open ports
tool for exposing passwords & secrets in Git repos
Gitleaks
Tripwire
Commercial Product
File Integrity & Change Monitoring
Security Configuration Management
Vulnerability and Risk Management
They offer “Managed Cybersecurity Services”
Metasploit (not Metasploitable)
Exploitation Framework
links vulnerabilities with known exploits and allows you to just run them
OpenVAS
Open Vulnerability Assessment Scanner
unauthenticated and authenticated testing
various high-level and low-level internet and industrial protocols
performance tuning for large-scale scans
powerful internal programming language
Nessus
Commercial Vulnerability Analysis Tool.
OpenVAS was made as an open source alternative.
Kali
Linux distro for cybersecurity
Vulnerability Database
A local database of signatures (virus, packet, logs, etc) that is used when scanning for vulnerabilities. (Like Anti-Virus, they have databases or definitions too)