Miscellaneous Flashcards
Smart card
card with chip on it to verify yourself, like credit card
Motherboard
connects all parts of a computer together, most importantly the CPU and memory (RAM)
BIOS
firmware (permanently stored software on the motherboard). First program run when computer started, even before OS. After it´s done, it looks for a boot device (an OS), Checks that all hardware is there
Power on self test by BIOS
checks if hardware works correctly
Operating system
Windows, Linux … let´s you interact with computer hardware
Dynamic link library -DLL
Contain shared code that multiple programs use (like shared boks in libs). / can use at the same time. P.e. code for windows pop-ups, you can have several at one time
Kernel
computer program at the core of a computer’s operating system and generally has complete control over everything in the system. It is the portion of the operating system code that is always resident in memory, and facilitates interactions between hardware and software components.
Driver
responsible for interaction between hardware and operating system
Remote access trojan
malware designed to allow an attacker to remotely control an infected computer. Once the RAT is running on a compromised system, the attacker can send commands to it and receive data back in response
Signature
a signature is a typical footprint or pattern associated with a malicious attack on a computer network or system. This pattern can be a series of bytes in the file (byte sequence) in network traffic. It can also take the form of unauthorized software execution, unauthorized network access, unauthorized directory access, or anomalies in the use of network privileges.
Signature based detection
process where a unique identifier is established about a known threat so that the threat can be identified in the future. In the case of a virus scanner, it may be a unique pattern of code that attaches to a file, or it may be as simple as the hash of a known bad file.
Payload
is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action.
Lightweight programming
Lightweight programming languages are designed to have small memory footprint, are easy to implement (important when porting a language to different systems), and/or have minimalist syntax and features
Living off the land
refers to attacker behavior that uses tools or features that already exist in the target environment
Network perimeter
is the boundary between an organization’s secured internal network and the Internet — or any other uncontrolled external network
Flash BIOS
is a term used to describe the process of updating a computer’s motherboard. It is usually done to increase compatibility or increase the performance capabilities of a computer.
Logmonitoring
Almost all systems and software generate detailed logs: IDS, internet browsers, anti-malware software, routers, operating systems, firewalls, servers etc. As a result, a massive amount of log files is created every single day. These logs contain very crucial information in regard to the wellbeing and efficiency of your business
Drive
A drive is a location (medium) that is capable of storing and reading information that is not easily removed, like a disk or disc. All drives store files and programs used by your computer. For example, when you write a letter in a word processor, the program is loaded from the hard drive.
BitLocker
Microsoft BitLocker is a Windows native security feature that will encrypt everything on the drive that Windows is installed upon
Endpoint security
the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited
Runtime
Runtime is the period of time when a program is running. It begins when a program is opened (or executed) and ends with the program is quit or closed.
Tampering
An intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data
Central Processing Unit - CPU
“brain of computer”, processes data, executes instructions of program,
Container
A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another.
Data bus
A data bus is a system within a computer or device, consisting of a connector or set of wires, that provides transportation for data. The first standard for data bus was 32-bit, whereas newer 64-bit systems can handle much greater amounts of data.
A data bus can transfer data to and from the memory of a computer, or into or out of the central processing unit (CPU)
Buffer
fixed length block of memory
Software development toolkit (SDK)
set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms. These providers make their SDKs available to help developers easily integrate their apps with their services.
Stack
A stack (sometimes called a “push-down stack”) is an ordered collection of items where the addition of new items and the removal of existing items always takes place at the same end. items stored in the stack that are closer to the base represent those that have been in the stack the longest. The most recently added item is the one that is in position to be removed first.
Return address
this is the point the program should go back to when it is done with the call
NOP’s (No operation Commands)
tell a processor to move (or slide across the NOPs) to the next instruction
XML
XML (Extensible Markup Language) is a markup language similar to HTML, but without predefined tags to use. Instead, you define your own tags designed specifically for your needs. This is a powerful way to store data in a format that can be stored, searched, and shared
Address
Location in memory to store data
overflow
when result of addition is too large to be represented by the bits you have
Secure Sockets Layer - SSL
standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems
Spoofing
diverse methods available to control and operate the fundamental address system in different computer networks
VLAN tagged/untagged
VLAN-enabled ports are generally categorized in one of two ways, tagged (also called trunked) or untagged. A VLAN is segmented (A VLAN purpose is to allow end point devices to be segregated from each other even though they might be connected on the same physical switch). Then, the purpose of a tagged port is to pass traffic for multiple VLAN’s, whereas an untagged port accepts traffic for only a single VLAN
Network internet card - NIC
connects computer with network using ethernet cable, converts serial to parallel data, each NIC has unique identifier called MAC address
RAM
stored on motherboard. Program wants to run, therefore needs to be loaded from hardware, where it is stored, into RAM. Then CPU can access it from there.
Buffered RAM (there is also unbuffered RAM)
stores data before it gets to CPU (adds reliability)
Secondary vs primary memory
secondary stored on hard drive, primary like RAM
Hub
not intelligent so doesn´t know where to send data. Data arrives, then gets copied to all ports, so all devices connected with hub get data
Switch
like hub but is intelligent, it sends it only to the destinated ports, so eliminates unnecessary traffic
Router
forwards data from one network to other based on IP address. Like gateway for network
Transmission Control Protocol - TCP
3 way handshake. Send message to computer, send back, send another to receiver. Then data is delivered. Guarantees delivery. If sth gets lost it will be re-send
User Datagram Protocol - UDP
sends data but doesn´t check if it is received. Faster than TCP
Domain name system - DNS
each website has an ip addredd- DNS is like a database, if you type in yahoo, DNS checks which ip address it has and connects it to you
File Transfer Protocol
to upload and download files between internet users
HTTP: Hypertext transfer protocol
To retrieve data from websites
Secure Shell (SSH)
transfers sensitive data. Places shell around data
Port
for logical connections, p.e. port 80 is HTTP