Sec 701 - General Terms Flashcards

1
Q

RADIUS

A

Remote Authentication Dial-In User Service - Networking protocol that authorizes & authenticates users who access a remote network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIDS

A

Network Intrusion Detection System - Inspects network traffic at the packet level to identify threat. ALERTS ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPS

A

Host Intrusion Prevention System - Blocks malicious activities on a host machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoC

A

Indicators of Compromise - High network activity, changes to file hashes, irregular international traffic, account lockouts, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SOAR

A

Security Orchestration Automation Response - Allows incidents to be responded to immediately through automation. SIEM but with automated response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AIS

A

Automated Indicator Sharing - Machine-readable threats communicated between private and public sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NVD

A

National Vulnerability Database - Government repository based on vulnerability management data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TAXII

A

Transport mechanism for STIX (Encrypted through HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STIX

A

Programming language for conveying data about CS threats in a way that can be understood by humans and machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA

A

Confidentiality, Integrity, Availability - Fundamentals of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WMI

A

Windows Management Instrumentation - Standardized & flexible way to manage windows computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLP

A

Data Loss Prevention - Detects & prevents data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SIEM

A

Security Information & Event Manager - Helps organizations detect, analyze, and respond to threats. ALERTS ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PCI Compliance

A

Payment Card Industry - Mandates how credit card information is stored on computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PHP

A

Hypertext Pre-processor - General purpose scripting language geared toward web development. VULNERABLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMB

A

Server Message Block - Communication protocol between NODES used to share files, serial ports, misc communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RFC

A

Request for Comments - Formal documents that describes the specifications for a particular technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Technical Controls

A

Controls implemented using systems (Firewalls, antivirus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Managerial Controls

A

Administrative controls associated with security design & implementation. (Security policies, standard operating procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Operational Controls

A

Controls implemented by people instead of systems (Security guards, awareness programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical Controls

A

Physical security (Guard shacks, fences, badge readers, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Preventative Control Type

A

Block access to a resource (Firewalls, guard shacks, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Deterrent Control Type

A

Discourage an intrusion (Warning signs, threats of demotions, front desk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Detective Control Type

A

Identify & log intrusion attempts (Syslogs, login reports, motion detectors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Corrective Control Type

A

Apply a control after an event has been detected (Restoring from backups, contact law enforcement, policies created)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Compensating Control Type

A

Control using other means - may be temporary (Firewall blocks a specific app instead of patching, simultaneous guard duties, generator used after power outage.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Directive Control Type

A

Direct a subject towards a security compliance

28
Q

Non-repudiation

A

Cannot deny what you’ve said. Digital signature adds non-repudiation, others can see signature. Proves integrity.

29
Q

AAA

A

Authentication, Authorization, and Accounting

30
Q

Authentication

A

Prove who you are - Password & MFA

31
Q

Authorization

A

Based on identification & authentication, what access do you have?

32
Q

Accounting

A

Login time, data sent & received, logout time

33
Q

CA

A

Certificate Authority - Entity that stores, signs, and issues digital certificates.

34
Q

Gap Analysis

A

Where you are compared to where you want to be with security protocols and procedures

35
Q

NIST

A

National Institute of Standards and Technology - Understand and REDUCE companies cybersecurity risk and protect their networks and data

36
Q

ISO

A

Standard to IMPROVE an organization’s information security management system

37
Q

Planes of Operation

A

Data Plane, Control Plane

38
Q

Data Plane

A

Routers, switches, firewall (Process frames, packets, network data)

39
Q

Control Plane

A

Policies, rules (Manages actions of data plane, how a packet should be forwarded, routing tables, etc.)

40
Q

Honey Pots

A

Attractive target for an attacker, alerts IT when tripped

41
Q

Honeynets

A

A real network that includes multiple devices, alerts & sometimes traps an attacker

42
Q

Honeytokens

A

Tracks the malicious actors once tripped

43
Q

Allow List

A

Nothing runs UNLESS APPROVED - very restrictive

44
Q

Deny List

A

Nothing on the deny list can be executed - allow everything else

45
Q

PKI

A

Public Key Infrastructure - Binding of public keys to people or devices

46
Q

Symmetric Encryption

A

SINGLE shared key, encrypt & decrypt done with same key. Does not scale well but very fast.

47
Q

Asymmetric Encryption

A

Two or more mathematically related keys. Private & public keys are used

48
Q

Private Key

A

Asymmetric encryption - only you have access to this key. You receive an email sent to you using your public key, use your private key to decrypt the message.

49
Q

Public Key

A

Asymmetric encryption - Everyone has access to this key, used to encrypt messages being sent to someone & they use their private key to decrypt the message.

50
Q

VPN

A

Encrypts all data transmitted over the network, forms a tunnel to a target. Client-based uses SSL/TLS, Site-to-site uses IPsec

51
Q

Key Stretching

A

Make a weak key stronger (hash a password then has the hash of the password, etc)

52
Q

Out of Band Key Exchange

A

Do NOT use internet to exchange. Call, courier, or in-person exchange

53
Q

In Band Key Exchange

A

On the network, use asymmetric encryption to deliver a symmetric key

54
Q

TPM

A

Trusted Platform Module - Cryptography hardware on a device (micro-controller) on a motherboard. Bitlocker can utilize this unique hash to create encrypted keys to protect hardware from unwanted changes.

55
Q

Tokenization

A

Replace sensitive data with a non-sensitive placeholder. Original data & token are not mathematically related

56
Q

Rainbow Table

A

Common passwords and their respective hashes that can be used to match with user accounts if a malicious actor gets access to usernames and hashed passwords.

57
Q

X.509

A

Standard format of certificates - easy readability and standard for digital certs

58
Q

Root of Trust

A

I trust this site, so you should also trust this site because I do.

59
Q

HSM

A

Hardware Security Module - Physical computing device that safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures

60
Q

TOCTOU

A

Attack type. Something may happen between the check of variables and the change of variables. Gaps in this can allow an attacker to time a change perfectly so between the change and the check, there is a discrepancy between what is and what should be. (The what is, is beneficial to the attacker. Ex. Having more money than they should.)

61
Q

XSS attack

A

Cross Site Scripting - Takes advantage of trust a user has for a site.
Attacker sends malicious script in email/SMS/etc, clicks link to legit site, malicious script sends important info (username, password) to the attacker in plaintext.

62
Q

AUP

A

Acceptable Use Policy - Agreement between a user and the computer administrator that addresses all of the rights, privileges, and rules that users must adhere to when using computer resources.

63
Q

TACACS+

A

Terminal Access Controller Access-Control System - Popular provider of AAA

64
Q

PKI

A

Public Key Infrastructure - System of processes, technologies, and policies that allows you to encrypt and sign data

65
Q

BIA

A

Business Impact Analysis - Process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations

66
Q
A