Sec+ Book Flashcards
Cross Site Scripting (XXS)
Attackers embed malicious html or java code into website to capture cookies or hased passwords
Cross Site Request Forgery
attacker tricks user into preforming an action on a website that creates a html link
Code Signing
provides digital signature for code +certification includes hash for code
Static Code Analysis
examines code without running it
Dynamic Code Analysis
examines code while running
Sanboxing
isolated area used for testing
Domain Hijacking
attacker changes registration of domain name without permissions from the owner, usually social engineering
Shimming
produces solution that makes it appear that older drivers are compatible
Refractoring
Rewriting code without changing behavior
Memory Leak
a bug in the app that consumes more memory as it runs
Integer overflow attack
attempts to create numeric value that is too big for an application to handle
Buffer Overflow
when an app recieves more input or different input then expected
Diffie Hellman
algorithm used to private share key between two paroes
MD5
Message Digest - Produces 128 bit hash shown in hexadecimal
SHA
Secure Hash Algorithm - Verifies integrity
Diffusion
Small changes in plain text result in large changes in cipher
Block Cipher
encrypts data in specific sized blocks of 8
Twofish
Blowfish
RC5
CFB
Stream Cipher
encyrpts data as a stream of bits rather than blocks and is more efficent
RC4
TLS
AES
Online Certificate Status Protocol (OCSP)
allows the client to query the ca with serial number of the certificate
Transport Layer Security (TLS)
encrypts https traffic, replacement for SSL,port 443 (TLS)
Secure Sockets Layer (SSL)
certificate based authentication + encrypts data with a combinations of both symmetric and asymmetric
Pretty good Privacy (PGP)
Encrypts email traffic with RSA
CA
Certificate Authority
CRL
certificate revocation list, CA Revoked
XSRF
cross site request forgery
web application tricks user into performing acts on a site ex. purchasing
DAC
Discretionary access control
all objects have owners they modify permissions. DAC allows coworkers to share information within a corporate file system
AES
Advanced Encryption. BLOCK CIPHER encrypts in 128 bit blocks. Can use key sizes 128.192. 256
DES
data encryption standard. Used to provide confidentiality, replaced by AES and 3DES
DLP
Group of technologies that prevent data loss ex. block usb
DSA
Digital Signature Algorithm
encrypts hash of a message
LDAP
Lightweight directory access protocol
used to communicate with directories, indentifies objects and query strings using codes
IPSEC
Internet protocol security
a suite of protocols used to encrypt data in transit
IMAP
Internet Message Access Protocol. Store and manage emails on server
HMAC
Hashed based one message authentication code. A hashing algorithm to verify message of shared key
HOTP
HMAC Based one time password. one time password combines with a secrete key
FDE
Full disk encryption
RADIUS
Remote Authentication Dial In User Service
Process central authentication for remote access client
PKI
Public Key Infrastructure
Group tech used to request, create, manage, store, distribute or revoke digital certificates. Allows two entities privately share symmetric keys without any prior communication
PAP
Password Authentication Protcol. Old protocol that used cleartext
OSCP
Online Certificate Status Protocol
Alternative to CRL. Allows entities to query into the CA with the serial number of a certification
NTLM
New Technology LAN Manager. Protocols that provide CIA in windows systems,128 bits
NAC
Network Access Control - System inspects client to observe health
MSCHAPv2
Microsoft Challenge Handshake Authentication Protocol, provides mutual authentication
Mandatory Access Control (MAC)
restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity. method of limiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity. You define the sensitivity of the resource by means of a security label
RAT
Remote Access Trojan
RSA
Rivest, SHamir, Adleman - AYSEMMETRIC algorithm used to encrypt data and digitally sign transmissions
SAML
Security Assertion Markup Language
an XML based standard used to exchange authentication
IdP gigitally signs request confirming users identity, then this isent to the SP Service Provider to grant access
SCADA
Security Control and Data Acquisition - system used to control an Industry Control System
SOAR
(security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about cybersecurity threats and respond to security events with little or no human assistance.
SIEM
Security Information and Event Management - Security system that attempts to look at security events throughout organization
SNMPv3
Simple network management Protocol - monitor and manage network devices
SSH
Secure shell - used to encrypt network traffic
SSO
Single Sign on - Authentication method where users can access multiple resources on a network using a single sign on
STP
Spinning Tree Protocol - protects switches from looping
TACACS+
Terminal Access Controller Access Control System+
provides central authentication for remote access clients
TOTP
time based one time password
uses a timestamp that expires after a set time
TPM
Trusted Platform Module- chip on a motherboard that produces full disk encryption, remote attestation, and a secure boot process
UTM
Unified Threat Manager - group of security controls combined in a single solution
Technical Control
one that uses tech to reduce vulnerabilities. encryption, antivirus, IDS, firewalls, least priveldge
least privilege (PoLP)
user or entity should only have access to the specific data, resources and applications needed to complete a required task.
Administrative Controls
risk vulnerability assessments, day to day ops, security and awareness training
Preventive Controls
Prevent security incidents including hardening, user training, guards, account management
Corrective Controls
attempts to reverse the impact of an incident or problem after its occured, IPS< backups, recover plans
Compensating Control
when you cant use the primary control
Netstat
view stats for TCP/IP Protocols
Virtualization
allows multiple servers to operate on a single physical host
VM Sprawl
when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively
ARP Command
view and manipluate the ARP cache
VM Escape
the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor
RoleBAC
Role Based Access Control - used roles to manage rights and perms for users.
RuleBAS
uses rules like a firewall
ABAC
Attribute based access control uses policies to evaluate attributes and grant access when the system detects a match in the policy. You can also use an ABAC policy to enforce more complex behavior, such as ‘users from the Sales department can only edit CRM records during work hours.
Crossover Error Rate
quality of the biometric system
False Rejection Rate
percentage of time false rejections occur
Smart Cards
credit card sized cards that authenticate using PKI. Certificate based
Kerberos
Authentication protocol using tickets
Airgap
A metaphor for physicals isolation, indicating that a system or network is completelty isolated from another system/network
DMZ
Demilitriziaed Zone - provides a layer of security for servers that are accessible from the internet
WAF
Protects a web server against web application attacks, usually placed in the DMZ
802.1x server
provides strong port secuirty using port based authentication. Prevents rogue devices form connection to a network by ensuring that only authorized clients can
SSID
Server Set Identifier is the name of the wireless network. Disabling ssid broadcast hides a wireless network from casual users
Bluejacking
sends information to a device
sending unsolicited messages thru the phone.