Random Stuff I need to learn Flashcards
PAP
Password Authentication Protocol (PAP) - Username and password
TCP & UDP
Transmission Control Protocol & User Datagram Protocol
Layer 4
Enables different types of data transmission from a network source to the destination. TCP is more reliable, while UDP prioritizes speed and efficiency
ICMP
Internet Control Message Protocol
Error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets
Reports on network congestion and reachability. Utilities such as ping and tracert use ICMP as their transport mechanism
NOT a transport protocol
Server Clusters
Server clusters include two or more servers working together to offer services
NAT
Network Address Translation
Used in routers. Maps multiple local private addresses to a public one before transferring the information
Translate a set of IP addresses to another set of IP addresses
RAID 0
Provides data STRIPING across multiple disks to increase performance. Focused on speed and performance. Atleast 2 hard drives
RAID 1
Provides redundancy by MIRRORING the data identically to 2 hard drives. Atleast 2 hard drives
RAID 5
Provides redundancy by STRIPING data and PARITY data across the disk drives. Requires at least of 3 disk drives
RAID 6
Provides redundancy by STRIPING and DOUBLE PARITY data across the disk drives. Requires at least 4 hard disks
RAID 10
Creates a striped RAID of two mirrored RAIDs (combines RAID 1 & RAID 0)
Bluejacking
The sending of unsolicited messages to Bluetooth enabled devices (sends info)
Bluesnarfing
Unauthorized access of info from a wireless device over Bluetooth (takes info)
XSS/CSS
Cross-Site Scripting
When malicious code is inserted into the website
XSRF/CSRF
Cross-Site Reference Forgery
When an attacker forces a user to execute actions on a web server that they are already authenticated (logged into)
Daemons
Computer program that runs as a background process, rather than being under the direct control of an interactive user
SCADA
Supervisory Control and Data Acquisition - Type of ICS (Industrial Control System) that manages large-scale, multi-site devices and equipment spread over a geographic region.
Commonly used in manufacturing companies
SNMP
Simple Network Management Protocol - A TCP protocol that aids in monitoring network attached devices and computers
Provides info about memory & CPU usage and other device details. Port 161 UDP
Data Sovereignty
The legal concept that says data is subject to the laws of the country where it is stored
Applicable laws and regulations based on the physical location of digital data.
Legal Hold
Process designed to preserve all relevant information when litigation (lawsuit) is reasonably expected to occur
The legally required implementation of evidence preservation
Chain of Custody
Requires evidence to be gathered in a legal manner, documented, and securely stored at all time
The process of handling evidence so that it is admissible in court. Evidence should be labeled, locked away when not in use, and if it is transferred to someone else it needs to be documented who and when.
Chain of custody forms list every person who’s worked with or who has touched the evidence that is a part of an investigation
PKI
Public Key Infrastructure
A group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Allows users to communicate securely without personally knowing one another
Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications
A hierarchy of digital security certificates
Entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption
Logic Bomb
Malicious code that is embedded into a system and may only be activated when certain conditions are met, like timers or system events
Smash the Stack
Occurs when an attacker fills up the buffer with NOP so that the return address may hit a NOP and continue on until it finds the attacker’s code to run
RPs
Provide services to members of a federation
What happens during reconnaissance?
Testers will look for info about an organization such as domain names and email addresses.
Retinal scan
Takes several photos of the back of your eye, visualizing your retina, optic disc, and blood vessels
Iris Scan
Rely on the matching of patterns on the surface of the eye using near-infrared imaging, and is less intrusive than retinal scanning (the subject can continue to wear glasses, for instance) and much quicker
Much less likely to be affected by diseases
IMAP
Internet Message Access Protocol (IMAP) - TCP/IP application protocol that provides a means for a client to ACCESS EMAIL messages stored in a mailbox on a remote server using TCP
Port 143
User and entity behavior analytics (UEBA)
System that can provide automated identification of suspicious activity by user accounts and computer hosts
Cognitive Password
Form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity.
If you post a lot of personal info about yourself online, this password type can easily be bypassed
DaaS/VDI
Desktop as a Service - provides a full virtualized desktop environment from within a cloud-based service. Also known as VDI (Virtualized Desktop Infrastructure)
Virtualization implementation that separates the personal computing environment from a user’s physical computer
*ShadowPC
Pharming
Attack intended to redirect a website’s traffic to another, fake site by installing a malicious program on the computer.
Can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software
Occurs when an attacker attempts to obtain personal or private information through domain spoofing or poisoning a DNS server
Rogue anti-virus
Form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer)
OCSP
Status of certificates…provides validity such as good, revoked
Virtual Switch
Software application that allows communication between virtual machines
Enumeration
Process of extracting usernames, machine names, network resources, shares, and services from a system
CSR (certificate signing request)
What is submitted to the CA (certificate authority) to request a digital certificate
ARP
Address Resolution Protocol
Layer 2 protocol used to map MAC addresses to IP addresses
Procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN)
Protocol that enables network communications to reach a specific device on the network.
SIP traffic
Used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications
Voice and video..VoIP
In Linux, what command shows the first 10 entries in a text-based application log file?
head
In Linux, what command shows the last 10 entries in a text-based application log file?
tail
Implicit Deny
Traffic is denied the ability to enter or leave the network because there’s no specific rule that allows it
All access to a resource should be denied by default and only allowed when it’s explicitly stated
When a user or group are not granted a specific permission in the security settings of an object, but they are not explicitly denied either
Explicit Deny
Traffic is denied the ability to enter or leave the network because there’s an ACL rule the specifically denies it
Smurf attack
Uses a single ping with a spoofed source address sent to the broadcast address of a network. This causes every device within the network to receive a single ping, which appears to come from the device with the spoofed source address.
Form of DDoS attack
Explicit Allow
Traffic is allowed to enter or leave the network because there’s an ACL rule that specifically allows it
Security Logs
Shows auditing entries related to activities such as logon attempts or file access
Logs the events such as successful and unsuccessful user logons to the system
Application Logs
Logs the events for the operating system and third-party applications
File that contains info about events that have occurred within a software application
Event Log
File containing records of event data
Records events from various sources and stores them
Access Log
Contains detailed information about each request made to the serve
Contains a list of each of the files accessed on a server
Steganography
Technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection;
IaaS
Infrastructure as a Service
Model that provides the user with the hardware needed to get up and running, the end user is responsible for the operating system, the application, and any ongoing maintenance tasks
3rd party provides you with infrastructure services, like storage and virtualization, as you need them, via a cloud, through the internet
Allow organizations to manage their business resources — such as their network, servers, and data storage — on the cloud
Focused on moving your servers and computers into the cloud
PaaS
Provider hosts the hardware and software on its own infrastructure and delivers this platform to the user as an integrated solution, solution stack, or service through an internet connection.
Provides that platform for software developers to create, allowing them to concentrate on the software itself instead of any external issues
Allow businesses/developers to host, build, and deploy application
Saas
Software as a Service
Provides an entire application that is managed by a provider, via a web browser
DHCP
Dynamic Host Configuration Protocol
Used to dynamically assign IP addresses
Assigns IP addresses and other configurations to devices when they connect to a network
Port 67
FACT: Wifi Channels can be changed
Hashes vs Encryption
Hashes provide assurances of messages authenticity and integrity. Hashes ensure original dada hasn’t been changed
Encryption provides confidentiality not integrity
Blowfish
Symmetric. Block cipher
RC4
Symmetric. Stream cipher
MD5
Hashing algorithm, neither symmetric or asymmetric
RSA
Asymmetric
Wireshark
Open source packet capturing and analysis tool.
chmod
Linux command…used to manipulate system permissions
Change/modify file system permissions
nmap
Network reconnaissance and assessment tool used to scan hosts for open network service port
Network scanner that discovers hosts and services on a computer network by sending packets and analyzing the responses
Port scanner commonly used for host discovery and service identification
nslookup
Name server lookup. Used to troubleshoot DNS problems. Name resolution
Proxy Server…4 types?
A device that acts as a middle man between a device and a remote server.
4 types: IP proxy, caching proxy, internet content filter & web security gateway
Helps prevent an attacker from invading a private network and is one of several tools used to build a firewall
A system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network
Process requests on another network device’s behalf
Identity federation
Uses security tokens generated by a trusted identity source to allow access to resources such as websites
Single identity is created for a user and shared with all of the organizations in a federation
System of trust between two parties for the purpose of authenticating users and conveying information needed to authorize their access to resources.
Quantitative Risk Analysis
Identifies assets and risks and uses calculations such as ALE (annual loss expectancy) to prioritize and budget funds to manage these risks.
Uses numerical and monetary values to calculate risk
Requires detailed financial data, complex calculations and is time consuming.
Uses exact numbers
Qualitive Risk Analysis
One that uses judgment to determine potential losses if an incident occurs. Values cannot be ascertained with precision. They can include damages to reputation or brand image
Subjective and requires expertise on systems and infrastructure. Cheaper and faster
Categorizes things based on the likelihood and impact of a given incident using non-numerical terms, such as high, medium, and low.