Miscellaneous Flashcards
Smart card
card with chip on it to verify yourself, like credit card
Motherboard
connects all parts of a computer together, most importantly the CPU and memory (RAM)
BIOS
firmware (permanently stored software on the motherboard). First program run when computer started, even before OS. After it´s done, it looks for a boot device (an OS), Checks that all hardware is there
Power on self test by BIOS
checks if hardware works correctly
Operating system
Windows, Linux … let´s you interact with computer hardware
Dynamic link library -DLL
Contain shared code that multiple programs use (like shared boks in libs). / can use at the same time. P.e. code for windows pop-ups, you can have several at one time
Kernel
computer program at the core of a computer’s operating system and generally has complete control over everything in the system. It is the portion of the operating system code that is always resident in memory, and facilitates interactions between hardware and software components.
Driver
responsible for interaction between hardware and operating system
Remote access trojan
malware designed to allow an attacker to remotely control an infected computer. Once the RAT is running on a compromised system, the attacker can send commands to it and receive data back in response
Signature
a signature is a typical footprint or pattern associated with a malicious attack on a computer network or system. This pattern can be a series of bytes in the file (byte sequence) in network traffic. It can also take the form of unauthorized software execution, unauthorized network access, unauthorized directory access, or anomalies in the use of network privileges.
Signature based detection
process where a unique identifier is established about a known threat so that the threat can be identified in the future. In the case of a virus scanner, it may be a unique pattern of code that attaches to a file, or it may be as simple as the hash of a known bad file.
Payload
is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action.
Lightweight programming
Lightweight programming languages are designed to have small memory footprint, are easy to implement (important when porting a language to different systems), and/or have minimalist syntax and features
Living off the land
refers to attacker behavior that uses tools or features that already exist in the target environment
Network perimeter
is the boundary between an organization’s secured internal network and the Internet — or any other uncontrolled external network
Flash BIOS
is a term used to describe the process of updating a computer’s motherboard. It is usually done to increase compatibility or increase the performance capabilities of a computer.
Logmonitoring
Almost all systems and software generate detailed logs: IDS, internet browsers, anti-malware software, routers, operating systems, firewalls, servers etc. As a result, a massive amount of log files is created every single day. These logs contain very crucial information in regard to the wellbeing and efficiency of your business
Drive
A drive is a location (medium) that is capable of storing and reading information that is not easily removed, like a disk or disc. All drives store files and programs used by your computer. For example, when you write a letter in a word processor, the program is loaded from the hard drive.
BitLocker
Microsoft BitLocker is a Windows native security feature that will encrypt everything on the drive that Windows is installed upon
Endpoint security
the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited