Sec 701 - General Terms Flashcards
RADIUS
Remote Authentication Dial-In User Service - Networking protocol that authorizes & authenticates users who access a remote network.
NIDS
Network Intrusion Detection System - Inspects network traffic at the packet level to identify threat. ALERTS ONLY
HIPS
Host Intrusion Prevention System - Blocks malicious activities on a host machine
IoC
Indicators of Compromise - High network activity, changes to file hashes, irregular international traffic, account lockouts, etc.
SOAR
Security Orchestration Automation Response - Allows incidents to be responded to immediately through automation. SIEM but with automated response
AIS
Automated Indicator Sharing - Machine-readable threats communicated between private and public sectors
NVD
National Vulnerability Database - Government repository based on vulnerability management data
TAXII
Transport mechanism for STIX (Encrypted through HTTPS)
STIX
Programming language for conveying data about CS threats in a way that can be understood by humans and machines
CIA
Confidentiality, Integrity, Availability - Fundamentals of security
WMI
Windows Management Instrumentation - Standardized & flexible way to manage windows computers.
DLP
Data Loss Prevention - Detects & prevents data breaches
SIEM
Security Information & Event Manager - Helps organizations detect, analyze, and respond to threats. ALERTS ONLY
PCI Compliance
Payment Card Industry - Mandates how credit card information is stored on computer networks
PHP
Hypertext Pre-processor - General purpose scripting language geared toward web development. VULNERABLE
SMB
Server Message Block - Communication protocol between NODES used to share files, serial ports, misc communications.
RFC
Request for Comments - Formal documents that describes the specifications for a particular technology
Technical Controls
Controls implemented using systems (Firewalls, antivirus)
Managerial Controls
Administrative controls associated with security design & implementation. (Security policies, standard operating procedures)
Operational Controls
Controls implemented by people instead of systems (Security guards, awareness programs)
Physical Controls
Physical security (Guard shacks, fences, badge readers, etc.)
Preventative Control Type
Block access to a resource (Firewalls, guard shacks, etc)
Deterrent Control Type
Discourage an intrusion (Warning signs, threats of demotions, front desk)
Detective Control Type
Identify & log intrusion attempts (Syslogs, login reports, motion detectors)
Corrective Control Type
Apply a control after an event has been detected (Restoring from backups, contact law enforcement, policies created)
Compensating Control Type
Control using other means - may be temporary (Firewall blocks a specific app instead of patching, simultaneous guard duties, generator used after power outage.)