July 2024 Flashcards

1
Q

URDF

A

Unified Robotic Description Format
Contains info about a platform (useful for high level understanding by the user)
Kinematics
Dynamics
Visual & Collision Properties
Sensors & Actuators
Modularity & Reusability

Basically the USD of Robotics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

STIG

A

Security Technical Implementation Guide
DISA STIG is a popular one (Defense Information Systems Agency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ansible

A

An open source IT automation engine that automates provisioning, configuration management, application deployment, orchestration, and other IT stuff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ansible vs. bash?

A

Bash: Do a thing - describes an action.
Ansible: Set a state - describes the state, then is capable of generating the necessary action(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ClamAV

A

Anti-virus software for Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bitdefender

A

Anti-virus software for Linux
Discontinued the Home Linux, moved to pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSSEC

A

Open Source SECurity

Host-base Intrusion Detection System (HIDS)
Rootkit Detection
Active Response
Log Based Intrusion Detection
File Integrity Monitoring
System Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIDS

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNORT

A

open source Intrusion Prevention System (IPS)
series of rules -> help define malicious network activity
use rules to detect packets that match -> User alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

rootkit

A

The worst kind of malware
Kernel parasite (or hidden really deep)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Metasploitable

A

A version of Linux that is purposefully made vulnerable for the purpose of testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OpenSCAP

A

Configuration Checker
Security
Content
Automation
Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lynis

A

POSIX security suite. Extensive health scan.

Security Auditing
Compliance Testing

Penetration Testing
Vulnerability Detection
System Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AIDE

A

Advanced Intrusion Detection Environment
Open Source HIDS (Host-based Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Nmap

A

The Network Mapper - Free Security Scanner
scan networks for hosts/services/open ports

18
Q

tool for exposing passwords & secrets in Git repos

19
Q

Tripwire

A

Commercial Product
File Integrity & Change Monitoring
Security Configuration Management
Vulnerability and Risk Management
They offer “Managed Cybersecurity Services”

20
Q

Metasploit (not Metasploitable)

A

Exploitation Framework
links vulnerabilities with known exploits and allows you to just run them

21
Q

OpenVAS

A

Open Vulnerability Assessment Scanner
unauthenticated and authenticated testing
various high-level and low-level internet and industrial protocols
performance tuning for large-scale scans
powerful internal programming language

22
Q

Nessus

A

Commercial Vulnerability Analysis Tool.
OpenVAS was made as an open source alternative.

23
Q

Kali

A

Linux distro for cybersecurity

24
Q

Vulnerability Database

A

A local database of signatures (virus, packet, logs, etc) that is used when scanning for vulnerabilities. (Like Anti-Virus, they have databases or definitions too)

25
ELK Stack
Elasticsearch Logstash Kibana Beats General tool for log analysis. Take data from any source/format and search analyze & visualize Elk Stack are tools for SIEM (Security Information and Event Management)
26
Wazuh
Reporting/Triggering System for Big Data Analysis Hook it up to Splunk and report/trigger on findings.
26
SIEM
Security Information and Event Management Security Information Management (SIM) combined with Security Event Management (SEM). Collect from multiple sources, centralize, then analyze.
26
Fail2Ban
Anti-Brute-Force Consults auth.log for failed logins and bans hosts that do it too often
27
jsql-injection
database penetration tester automatic SQL injection (for gaining info)
28
SSHGuard
anti-brute force monitoring system logs detecting attacks blocking attackers using a firewall
29
Moloch
PCAP on steroids store and export all packets in standard PCAP format for later playback and analysis. indexes stored packets for fast retrieval named after deity known for child-sacrifice... Sheesh Stand in for Cannanite God Baal. --> Bahl (Baldur's gate god of murder)
30
Dr. Michael Shulman
Consultant (ex-Ford employee) brought in on Amendment #1 Help with testing and adhering to ITE CI guidelines
31
ITE CI guidelines
Institue of Transportation Engineers - Connected Intersection
32
OVAL
Open Vulnerability and Assessment Language
33
Greenbone
Vulnerability Management Software (company)
34
ArcherySec
Open Source Orchestration and Correlation Tool (ASOC) Correlation as in (correlating data/evidence from multiple tools)
34
Splunk
Commercial. searching, monitoring, analyzing big data (DBs, logs, sysfiles, etc)
34
5 Pillars of Cybersecurity
Identify Protect Detect Respond Recover
35
SPDU
Secured Protocol Data Units pertains to WSM (WAVE Short Messages, part of DSRC)
36
WAVE
Wireless Access in Vehicular Environments (WAVE) A crucial component of DSRC