July 2024 Flashcards

1
Q

URDF

A

Unified Robotic Description Format
Contains info about a platform (useful for high level understanding by the user)
Kinematics
Dynamics
Visual & Collision Properties
Sensors & Actuators
Modularity & Reusability

Basically the USD of Robotics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

STIG

A

Security Technical Implementation Guide
DISA STIG is a popular one (Defense Information Systems Agency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ansible

A

An open source IT automation engine that automates provisioning, configuration management, application deployment, orchestration, and other IT stuff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ansible vs. bash?

A

Bash: Do a thing - describes an action.
Ansible: Set a state - describes the state, then is capable of generating the necessary action(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ClamAV

A

Anti-virus software for Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bitdefender

A

Anti-virus software for Linux
Discontinued the Home Linux, moved to pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSSEC

A

Open Source SECurity

Host-base Intrusion Detection System (HIDS)
Rootkit Detection
Active Response
Log Based Intrusion Detection
File Integrity Monitoring
System Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIDS

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNORT

A

open source Intrusion Prevention System (IPS)
series of rules -> help define malicious network activity
use rules to detect packets that match -> User alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

rootkit

A

The worst kind of malware
Kernel parasite (or hidden really deep)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Metasploitable

A

A version of Linux that is purposefully made vulnerable for the purpose of testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OpenSCAP

A

Configuration Checker
Security
Content
Automation
Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lynis

A

POSIX security suite. Extensive health scan.

Security Auditing
Compliance Testing

Penetration Testing
Vulnerability Detection
System Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AIDE

A

Advanced Intrusion Detection Environment
Open Source HIDS (Host-based Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Nmap

A

The Network Mapper - Free Security Scanner
scan networks for hosts/services/open ports

18
Q

tool for exposing passwords & secrets in Git repos

A

Gitleaks

19
Q

Tripwire

A

Commercial Product
File Integrity & Change Monitoring
Security Configuration Management
Vulnerability and Risk Management
They offer “Managed Cybersecurity Services”

20
Q

Metasploit (not Metasploitable)

A

Exploitation Framework
links vulnerabilities with known exploits and allows you to just run them

21
Q

OpenVAS

A

Open Vulnerability Assessment Scanner
unauthenticated and authenticated testing
various high-level and low-level internet and industrial protocols
performance tuning for large-scale scans
powerful internal programming language

22
Q

Nessus

A

Commercial Vulnerability Analysis Tool.
OpenVAS was made as an open source alternative.

23
Q

Kali

A

Linux distro for cybersecurity

24
Q

Vulnerability Database

A

A local database of signatures (virus, packet, logs, etc) that is used when scanning for vulnerabilities. (Like Anti-Virus, they have databases or definitions too)

25
Q

ELK Stack

A

Elasticsearch
Logstash
Kibana
Beats

General tool for log analysis.

Take data from any source/format and search analyze & visualize

Elk Stack are tools for SIEM (Security Information and Event Management)

26
Q

Wazuh

A

Reporting/Triggering System for Big Data Analysis
Hook it up to Splunk and report/trigger on findings.

26
Q

SIEM

A

Security
Information
and Event
Management

Security Information Management (SIM) combined with
Security Event Management (SEM).

Collect from multiple sources, centralize, then analyze.

26
Q

Fail2Ban

A

Anti-Brute-Force
Consults auth.log for failed logins and bans hosts that do it too often

27
Q

jsql-injection

A

database penetration tester
automatic SQL injection (for gaining info)

28
Q

SSHGuard

A

anti-brute force
monitoring system logs
detecting attacks
blocking attackers using a firewall

29
Q

Moloch

A

PCAP on steroids
store and export all packets in standard PCAP format for later playback and analysis.
indexes stored packets for fast retrieval
named after deity known for child-sacrifice… Sheesh Stand in for Cannanite God Baal. –> Bahl (Baldur’s gate god of murder)

30
Q

Dr. Michael Shulman

A

Consultant (ex-Ford employee) brought in on Amendment #1
Help with testing and adhering to ITE CI guidelines

31
Q

ITE CI guidelines

A

Institue of Transportation Engineers - Connected Intersection

32
Q

OVAL

A

Open Vulnerability and Assessment Language

33
Q

Greenbone

A

Vulnerability Management Software (company)

34
Q

ArcherySec

A

Open Source Orchestration and Correlation Tool (ASOC)
Correlation as in (correlating data/evidence from multiple tools)

34
Q

Splunk

A

Commercial. searching, monitoring, analyzing big data (DBs, logs, sysfiles, etc)

34
Q

5 Pillars of Cybersecurity

A

Identify
Protect
Detect
Respond
Recover

35
Q

SPDU

A

Secured Protocol Data Units
pertains to WSM (WAVE Short Messages, part of DSRC)

36
Q

WAVE

A

Wireless Access in Vehicular Environments (WAVE)
A crucial component of DSRC