Security+ Set C Flashcards
C&C (command and control)
infrastructure of hosts and services with which attackers, direct, distribute, and control malware over botnets. Also known as C2.
CA Certificate Authority
a server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
CAC (common access card)
certificate based authentication and supports two-factor authentication.
CAN (controller area network bus)
A serial network designed to allow communications between embedded programmable logic controllers.
CAPTCHA (completely automated public turing test to tell computers and humans apart)
difficult for computers to interpret
CASB (cloud access security broker)
enterprise management software designed to mediate access to cloud services by users across all types of devices
CBC (cipher block chaining)
an encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext blockglossary
CCMP (counter mode with cipher block chaining message authentication code protocol)
encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.
CE (cryptographic erase)
method of sanitizing a self-encrypting drive by erasing the media encryption key.
CHAP (challenge handshake authentication protocol)
for dial up networks that uses encrypted 3 way handshake to authenticate client to server. The challenge response is repeated through the connection to guard against replay attacks.
CIA Triad
Also known as AIC triad. principles of security control and management
CIS (center for internet security)
not for profit organization. It publishes the well known top 20 critical security controls.
CN (common name)
An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.
COBO (corporate owned, business only)
Enterprise mobile device provisioning model where the device is the property of the organization and personal use is prohibited.
COPE (corporate owned, personally enabled)
Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, web browsing is permitted.
CRL (certificate revocation list)
a list of certs that were revoked before their expiration date
CSP (cloud service provider)
vendor offering cloud models
CSR (cert signing request)
base64 ASCII file that subject sends to a CA to get a certificate.
CTI (cyber threat intel)
process of ivestigating, collecting, analyzing, and diseminating info about emerging threats and sources. also known as threat intel.
CVE (common vulnerabilities and exposures)
scheme for identifying vulnerabilities developed by MITRE and adopted by NIST
CVSS (common vulnerability scoring system)
risk mgmt. approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.
CYOD (choose your own device)
enterprise mobile device provisioning model where employees are offered a selection of corporate devices for work and optionally private use.
Cloud Security Alliance
industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.
Cuckoo
implementation of sandbox for malware analysis
cable lock
physical secure against theft.
captive portal
a web page or website to which a client is redirected before being granted full network access.
capture the flag
training event where learners must identify a token within a live network environment
card cloning skimming
duplicating smart card by reading the confidential data stored on it.
carving
process of exgtracting data from a computer when that data has no associated file system metadata
cat command
linux command to view and combine (concatenate) files.
chain of custody
the record of evidence history from collection, to presentation in court, to disposal
change control
process by which the need for change is recorded and approved.
change mgmt.
process through which changes to configuration of info systems are implemented,.
checksum
output of a hash function. chmod Linux command for managing file permissions.
circuit-level stateful inspection firewall
a Layer 5 firewall technology that tracks the active state of a connection, and can make decisions based on the contents of network traffic as it relates to the state of the connection.
clean desk policy
organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive docs must not be left out hwere unauthorized personnel might see them.
cloud deployment model
classifying the ownership and managemtn of a cloud as public, private, community, or hybrid
cloud service model
classifying the provision of cloud services and the limit of the provider’s responsibility as a software, platform, infrastructure and so on.
code of conduct
professional behavior depend s on basic ethical standards.
code reuse
potentially unsecure programming practice of using code originally written for a different context.
code signing
method of using a digital signature to ensure the source and integrity of programming code.
cold site
predetermined alternate location where a network can be rebuilt after a disaster.
collector
network appliance that gathers or receives log and/or state data from other network systems
collision
in cryptography, the act of two different plaintext inputs producing the same exact ciphertext output.
community cloud
cloud deployed for shared use by cooperating tenants
compensating control
security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations
confidentiality
keeping info and comm private and protecting them from unauthorized access.
content filter
software app or gateway that filters client requests for various types of internet content.
context-aware authentication
access control scheme that verifies an objects identity based on various environmental facgtors, like time, location, and behavior
continuous delivery
software development method in which app and platform requirements are frequently tested and validated for immediate availability
continuous deployment
software development method in which app and platform updates are committed to production rapidly
continuous integration
method in which code updates are tested and committed to a development or build server/code repository rapidly.
continuous monitoring
constantly evaluating an environment for changes so that new risks may be more quicky detected and business operations improved upon. Also known as continuous security monitoring.
control risk
risk that arises when a control does not provide the level of mitigation that was expecgted
corrective control
control that acts after an incident to eliminate or minimize its impact.
counter mode (CTM)
encryption mode of operation where a numerical counter value is used to create a constantly changing IV
credential stuffing
brute force attack in which stolen user account names and passwords are tested against multiple websites
crossover error rate
biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.
curl command
utility for command-line manipulation of URL-based protocol requests.