security learning Flashcards
What is a form of spam through IM, PM, DM.
Spimming
443-TCP
Hyper Text Transfer Protocol Secure, Transmit web page data to a client over an ssl tls encrypted connection.
Collision Resistance
Property of a hash function that is computationally infeasible to find two colliding inputs.
161-UDP
Simple Network Management Protocol, remotely monitor network devices.
119-TCP
Network News Transfer Protocol Transport articles
On path attack, Man in the middle
Intercepts data
PKI
Public Key Infastructure, Set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, revoke digital certs and keys.
VPC
Victual Private Cloud, Private cloud in a public cloud
143-TCP
IMAP, Internet Message Access Protocol, Receive email from mail server with more functions than pop3
Deguassing
Expose hard drive to magnetic field which wipes the drive
Purging
Removes data and it cannot be reconstructed
Clearing
removal of data with assurance that it cannot be reconstructed
69-UDP
Trivial FTP, Simplified version of ftp to put a file on a remote host or get a file from host.
Nessus
Vulnerability check
NDA
Non Disclosure Agreement, Ensure sensitive data will not be disclosed to 3rd parties.
ISA
Interconnection Security Agreement, Defines how to secure communication
MOU
memorandum of understanding, general terms of agreement
MOA
Memorandum of agreement, defines granual contract details
Qualitative risk assessment
Organizes risks by severity or threat rating which may differ from one organization to another
APT
Advanced persistent threat, undetected for a long time steals data
Bluejacking
Sending unsolicited content to someone over Bluetooth
Blue Snarfing
Access to device data vie bluetooth
Jump Box
System on a network used to access and manage devices in a separate security zone
SQL Injection
Code injection that might destroy database. Placement of malicious code in SQL statements.
SOAR
Security orchestration automation response, Class of security tools that facilitate incident response threat hunting, security, configuration by orchestrating automated runbooks and deliver data enrichment.
URL Phishing
Fake url similar to real thing used to trap people
445-TCP
SMB, Server message bank, provide shared access top files and other resources on net work
RFID
Radio frequency identification, Access badge tracking
ECB
Electronic Code Book, mode of operation with a black cipher that’s mostly used with symmetric key encryption.
Public Cloud
Open to use for public
IDS
Intrusion Detection system, can only alert and log suspicious activity.
IPS
Intrusion prevention system, can also stop malicious activity from being executed.
Split DNS
Implementation in which separate dns servers are provided for internal and external networks as security and privacy management.
22 TCP/UDP
SSH,SCP,SFTP, Secure shell used to remotely administer network devices and systems. SCP for secure copy. SFTP for Secure ftp.
389-TCP/UDP
LDAP, Lightweight directory access protocol. Maintain directories of users and other objects.
Rogue Access Point
Unauthorized access point, wireless evil twin malicious copy of AP.
110-TCP
POP3, Post office protocol v3. Used to receive email from mail server.