Study Flashcards

1
Q

Authentication Factors

A

Something you know, have or are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Attributes

A

Less certain factors like IP or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

/etc/passwd

A

Contains user info + hashed passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

/etc/shadow

A

Contains encrypted passwords + security info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

%SystemRoot%System32\config\SAM

A

Where Windows stores passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TAP Active

A

Network management, boosts signal strength + makes data better to send to a monitoring tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TAP Passive

A

Copies network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SPAN (Mirror)

A

Copies traffic from a bunch of ports and mirrors to one port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

swapfile

A

When RAM is full data goes here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cdmlet

A

PowerShell command to control 1+ computers at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recovery Point Objective (RPO)

A

How much data a company can lose in a disaster event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RAM

A

Short term memory, data that is being actively used or processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cache Memory (CPU Memory)

A

Part of RAM, temporarily stores most frequently used instructions to make CPU process it faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hard Disk Drive (HDD)

A

Old school data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solid State Drive (SDD)

A

Like HDD but newer and better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controller Cache

A

Temporary storage area that saves frequently accessed data to speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dump Files

A

Captures what happens when program/system crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Self Encrypting Drive (SED)

A

Built in protection, very secure, good for performance but expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Full Disk Encryption (FDE)

A

Can be applied to any drive, cheaper but takes time to encrypt/decrypt everythang

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Honeypot

A

Single system/resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Honeynet

A

Bunch of connected honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Honeyfile

A

1 decoy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNS Security Extensions (DNSSEC)

A

Combats DNS poisoning, uses cryptographic signatures to ensure websites are legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DNSSEC Stages

A
  1. Signing the Data (making public/private keys)
  2. Key Distribution
  3. Signing Resource Records (Signing it)
  4. Authentication
  5. Chain of Trust (confirmation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IEEE802.1X

A

Network security, controls which devices are let in. Checks via device, switch and authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Security Enhanced Android (SEAndroid)

A

Security enhancements, assigns labels to everything, like what entity can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Memory Leak

A

Program/app not releasing temp memory when it’s done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Exception Handling

A

Code tries to do something it can’t/bugs out it doesn’t shut down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Clickjacking

A

Malicious website overlays/disguises their content over a legit one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

UEM (Unified Endpoint Management)

A

Controls multiple types of devices despite different OS’. Can do actions, change policies and update software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

XSS (Cross Site Scripting)

A

Attacker injects malicious script into legit website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

PAP (Password Authentication Protocol)

A

Old way of transmitting credentials, plaintext so unsecure unless using secure tunnel like IPSec. Basic username/password login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IPSec (Internet Protocol Security)

A

Encrypts data sent over network, provides integrity and authentication. Verifies identity of users involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

AH (Authentication Header)

A

Used in IPSec and encrypts the whole packet. Privudes authentication/integrity and protects against replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ESP (Encapsulated Security Payload)

A

Part of IPSec, encrypts the actual data payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

L2TP (Layer 2 Tunneling Protocol)

A

Creates tunnel between 2 endpoints. Creates VPN when used with IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

C2 Server (Command & Control Server)

A

Commands bots + botnets. Malware connects endpoints to C2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Hash Collision

A

2 different data inputs return the same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

DLL (Dynamic Link Library)

A

Precompiled functions from different apps to save resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DLL Injection

A

Insert code into running process. Can mask malware with legit code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

LDAP

A

Manages + accesses directory info over a network. Commonly used for user authentication and authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Directory Traversal Attack

A

Attack uses ../ to break free from directory and access forbidden ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Race Condition

A

Several processes trying to access the same resources at the same time = freak out, processes wont work properly and mistakes will be made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Improper Input Validation

A

Data input isn’t checked so users can insert malicious stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Network Replay Attack

A

Attacker resends user data to access users stuff. Attacker snooped on user comms and took info, then resends that info so it gets sent to them = access to user/network stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Session ID

A

Website assigns users loging a session ID so they don’t have to keep logging in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SSRF (Server Side Request Forgery)

A

Take control of a server and uses it as a proxy for naughty activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

On Path Attack

A

Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Shimming

A

Adding extra code (a shim) to smooth over compatibility issues, doesn’t affect core code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Refactoring

A

Changing essential code, malware refactors so it doesn’t match attack signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Sideloading

A

Downloading app from non official app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Prepending

A

Adding extra characters (01,02,03) for filing and security (random hashes/characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Fuzz Testing

A

Throwing random inputs to software to test it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Pass the Hash

A

Attacker logs in with just the hash not plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Bluejacking

A

Spam via bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Bluesnarfing

A

Unauthorised access to a device via bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Wireless Dissociation Attack

A

Kicking user off WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

2V (Initialisation Vector)

A

Like a salt, adds random data to result in diff ciphertexts for same data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

ARP Poisoning

A

Associate my MAC address with default gateway IP so network traffic gets sent to me

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DNS Poisoning

A

DNS translates URL to IP to take you where wanna go. This attack changes IP to take you somewhere else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Pharming

A

DNS poisoning falls under pharming, can also send you to identical looking website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

OT (Operational Technology)

A

Physical tech like machines or power plants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Federation

A

Use one company’s credentials for multiple logins, like Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

SAML

A

Document that contains AAA about the user, used for SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

OAuth (OpenAuthorisation)

A

Used in SSO/federation, lets apps access some user data without their credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Proxy/Proxy Server

A

Sits between users devices and external networks. It mediates comms, performs security, privacy, content filtering, and network performance optimisation. Forwards user requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Jump Server

A

Sits at edge of network and decides which external users are allowed access to internal servers. Users connect to jump server first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

ATT&CK (Attacks, Tatics, Techniques & Common Knowledge)

A

Part of Mitre, framework basically logs all known ATT for education and security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

SDK (Software Development Kit)

A

Set of tools, libraries, documentation devs use to built stuff. Means devs can focus on working not on low level implementation stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

DOM (Document Object Model)

A

Interface for web documents. Translates docs (like HTML/XML) into a tree like structure with nodes. Makes it easier to change stuff in the doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

VBA (Visual Basic)

A

Macro programming language, file extension is .vba or .bas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

RAD (Rapid Application Development)

A

Methodology for writing software faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Powershell

A

Command line and scripting language for Windows, file extension is .ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Unix

A

OS with great command line interface. File extension .sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

CVE

A

Directory of known exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

NVD (National Vuln Data)

A

Made by NIST, even better American CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

AIS (Automated Indicator Sharing)

A

USAs real time sharing of threat indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

STIX

A

Standardised language for sharing threat info/indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

TAXII

A

How people share infosec info like IoC and TTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

S/MIME

A

Email encryption, uses public key cryptography, relies on PKI, and allows use of digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

SOAR (Security Orchestration, Automation + Response)

A

Integrates diff tools, focuses on automated incident response, better for large orgs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

DEP (Data Execution Prevention)

A

Prevents code from being executed in memory that should only contain data, reduces exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

DHE (Diffie Helman Ephemeral/Exchange)

A

Asymmetric encryption where each key is newly generated for each session. Means past sessions can’t be comprimomised with current keys and vice versa
Often used in TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Nmap TCP/SYN Scan -sS

A

Stealthy way of checking for open ports on nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Nmap -O

A

Show open ports and OS but not the version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

tcpdump

A

Capture and analyse network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

nslookup

A

Lookup domain and IPs via querying DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

traceroute (tracert)

A

Find network topology. Traces route packets take from source to destination + records time it takes.
tracert - Windows
traceroute - Linux/Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

ip/ifconfig

A

Network interface info
ipconfig - Windows, gives IP, subnet mask, default gateway and DNS server
ifconfig - Linux, gives IP, subnet mask, broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

netstat

A

Shows network statistics, and traffic between local device and other devices on the network
Shows open ports, routing tables and network connections, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

rootkit

A

Virus that can change files and admin rights to gain privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Fault Tolerance

A

Ensuring a system can survive failure, through things like redundancy and load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Elasticity

A

System adaptability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Configuration Validation

A

Verifying config settings and ensuring they’re right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Recovery Point Objective (RPO)

A

The amount of data loss an org/system can sustain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Work Recovery Time (WRT)

A

How long after disaster recovery until reg work activities can resume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Recovery Time Objective (RTO)

A

Max amount of time disaster recovery can take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

RADIUS

A

AAA solution, scalable, works with network devices like switches and routers.
Only encrypts passwords. Centralised, open source. Works for stuff like WiFi and VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

TACACS+

A

AAA solution, same as RADIUS but is a Cisco proprietary control. Works primarily with Cisco devices but encrypts entire packet. More granular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Kerberos

A

AAA solution, the default Windows solution. Network authent, used for SSO and mutual authen between client/server - prevents onpath/replay attacks. Cryptographic ticketing system. Not every device compat with Kerberos
AS gives user a TGT
User gives TGT to TGS
User also gets ST from TGS to acces specific stuff like email
User sends ST to SS which decrypts it TGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

EAP

A

Butter that smooths over the AAA solutions/diff authentication solutions and allows them to work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

EAP-TLS

A

Uses digital certs for mutual authentication - most secure EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

EAP-PEAP

A

Uses TLS to produce encapsulate EAP messages in a secure tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

EAP-FAST

A

Sets up secure tunnel with PAC (Protected Access Credential) which securely transport credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Privilege Attribute Certificate (PAC)

A

Part of Kerberos, contains authorisation info about the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

EAP-TTLS

A

Like PEAP (secure tunnel) but uses a server side certificate, has mutual authentication between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Cryptographic primitive

A

A hash or a/symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Cryptographic system

A

Bunch of primitives like a cipher suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

SCADA

A

Manages industrial processes, monitors/controls/optimises processes/infra in real time. Does everything from remote control/security/alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Piggybacking

A

Like tailgating but tricking someone to let you in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Pivoting

A

Using a compromised account/system to gain access to other accounts/systems. Lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

EDR (Endpoint Detection + Response)

A

Detects/responds to advanced threats at endpoint level, does everything Bitdefender can basically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

EDR Traditional vs NG EDR

A

NG has AI, ML, user analytics, proactive threat hunting, good with cloud + helps protect diverse environments. Trad is none of that and is reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

RAID Level 0, 1, 5

A

0 is no redundancy but high performance (striping without parity), 1 is duplicating all data to another drive (mirroring), 5 is spreading data across a bunch of drives and having one drive that holds the full data (striping with parity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Signature Based Detection

A

Assign signatures to malware/malicious processes/attacks, etc Needs frequent updating to keep up with new attacks. Used by AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Sectoral/Directional Antennas

A

Sectoral for P2M and Directional for P2P

117
Q

Business Process Analysis (BPA)

A

Analyse stuff to understand how business process works.
1. Process inputs/outputs
2. Roles/responsibilities
3. Process flow/sequence
4. KPIs
5. Dependencies/interactions (want low dependencies)

118
Q

Load Balancer Layer 4 (Transport Layer)

A

Uses TCP and UDP, doesn’t inspect data transmissions, distributes info based on header info like IPs/ports - used for streaming services too

119
Q

Load Balancer Layer 7 (Application Layer)

A

HTML based, routes info based on URLs, cookies, etc as well as on data transmission content. It can test applications states

120
Q

Digital Certificates

A

Cryptographic document that binds the identity of an entity to a public key. Has public/private key pairs.
Only valid for x amount of time
Adheres to X.509 standard

121
Q

Digital Certificate Frequent Uses

A

Code signing certs for software validity
Email security (using key pairs for encryption)
In TLS/SSL protocols for security

122
Q

X.509

A

Standard that defines the format of public key certificates

123
Q

Certificate Authorities (CA)

A

Assigns the certificates, entire PKI system is based on trust of the CA.
Root CA - top of hierarchy, assigns intermediary CAs
Intermediary CAs - assign certificates to entities
If intermediary CA gets compromsied the root CA is still secure which is vital, limits the impact of compromise

124
Q

PKI (Public Key Infrastructure)

A

The framework that runs digital certificates

125
Q

RA (Registration Authority)

A

Investigates/verifies the identities of the entities applying for certificates

126
Q

CRL (Certificate Revocation List)

A

Lists that CAs update to tell entities when their certificates are expiring

127
Q

Interconnection Security Agreement (ISA)

A

When orgs need to work together or share data the ISA sets the ground rules of what is/n’t allowed

128
Q

Software Defined Networking (SDN)

A

Separates control plane from data plane in network devices. Makes network structure more flexible and efficient

129
Q

Control, Data and Management Planes

A

Control plane is the instructions on what to do (what to prioritise, secure or switch)
Data plane is the action of doing it
Management - monitors traffic and network status

130
Q

Order of Volatility

A

System memory cache, data on mass storage devices, remote monitoring data, archival media

131
Q

arp command

A

Helps detect spoofing attacks

132
Q

Service Oriented Architecture (SOA)

A

Prioritises services which are chunks of code that function independently and can be put in other apps or used for different stuff

133
Q

Microservices

A

Uses API to break app into ‘microservices’ for flexibility and scalability. Can change code in each microservice rather than whole app

134
Q

VM Sprawl + Countermeasures

A

Uncontrolled growth of VMs in a virtual enivronment. Usage audits + asset documentation

135
Q

VM Escape + Countermeasures

A

Malware running on guest OS escapes to another OS or to the host. Sandboxing + patch management

136
Q

CHAP

A

Standard login but sends password as a hash

137
Q

SLE (Single Loss Expectancy)

A

Loss expected from one event

138
Q

ALE (Annualised Loss Expectancy) + ALEm

A

Loss over a year, ALEm is with Mitigation so loss expectancy over a year with mitigation startegies included

SLExARO=ALE

139
Q

EF (Exposure Factor)

A

(Value of Loss/Asset Value) x100

140
Q

ARO (Annual Rate of Occurrence)

A

How many times a year will this happen

141
Q

ROSI (Return On Security Investment)

A

How much is saved

((ALE - ALEm) - Cost of Solution) / Cost of Solution

142
Q

Cyber Kill Chain Phases (Lockheed Martin)

A
  1. Reconnaissance
  2. Weaponisation
  3. Exploitation
  4. Delivery
  5. Installation
    6 Command and Control (C2)
  6. Actions on Objectives
143
Q

Hypervisor/VMM (Virtual Machine Monitor)

A

What VMs run on, like VirtualBox

144
Q

Stream Ciphers

A

Often used in symmetric encryption. Encrypt one bite at a time, are fast. Often include IV (like a salt) to the encryption

145
Q

Block Cipher

A

Often used in symmetric encryption. Encrypts whole blocks at a time, not bite by bite.

146
Q

Blockchain

A

Digital, decentralised ledger. Saved in ‘blocks’ and usually hashed. Used for crypto payments, online voting, etc

147
Q

Hybrid Cloud

A

Combines two or more cloud types, like public, private or community

148
Q

Fog Computing

A

Bridge between IoT (edge) devices and the cloud. Data can quickly be moved to cloud but not stored in there

149
Q

Edge Computing

A

IoT devices, they need only themseleves to do their tasks, don’t need to contact the cloud/internet. Like LED light

150
Q

Containerisation

A

Instead of using VMs to run each app, you contain each app in a ‘container’ (sandbox) and run them. More streamlined than virtualisation

151
Q

VPC (Virtual Private Cloud)

A

Secure sections in a public cloud that holds specific resources

152
Q

Transit Gateway

A

Directs users to correct VPC

153
Q

Normalisation

A

Removing duplicates of info in a database

154
Q

SQL Injection Countermeasures

A

Input validation and stored procedures (only xyz SQL commands accepted)

155
Q

Code Bloat

A

Source code being unnecessarily big and complicated

156
Q

TOTP

A

Time based one time password

157
Q

HOTP

A

HMAC Based One Time Password, generated with a secret key

158
Q

Multipath I/O

A

Technique that provides multiple paths between host and storage device. Mitigates single point of failure + enhances availability

159
Q

NIC (Network Interface Card) Teaming

A

Combining multiple NICs for performance, load balancing and redundancy

160
Q

UPS (Uniterruptable Power Supply)

A

Good for short term emergency power

161
Q

PDU (Power Distribution Unit)

A

Distributes power to multiple devices

162
Q

SAN (Storage Area Network)

A

Connects storage devices to servers at high speeds. Centralise storage management in a data center

163
Q

NAS (Network Attached Storage)

A

Storage device/server in a network that provides file storage to other devices. Shares and manages files

164
Q

Incremental Backup

A

Captures data that has changed since the last backup. Typically multiple incremental backups have the full data needed, it’s faster and uses less storage

165
Q

Differential Backup

A

Captures all data since the last FULL backup. Takes longer + more storage space but easier to restore

166
Q

Non-Persistence

A

When changes made to system are temp so they go away once there’s a reboot

167
Q

RTOS (Real Time Operating System)

A

OS where tasks are completed in specific time frames, have to be predictable. Used in medical devices, brakes, missiles, etc

168
Q

HSM (Hardware Security Module)

A

Secure hardware device that creates, manages and protects encryption keys. Can work with many devices

169
Q

Zigbee

A

Allows IoT devices to talk to each other

170
Q

Screened Subnet

A

DMZ, zone were servers/services are isolated usually between internet and internal systems

171
Q

ECC (Eliptic Curve Cryptography)

A

Asymmetric encryption method, suits things with low processing power like mobiles

172
Q

Session Key

A

Symmetric + used in only one session, used for session IDs

173
Q

Block Cipher ECB

A

Weak and shouldn’t be used, replicates encrypted blocks

174
Q

Block Cipher GCM

A

Secure encryption, provides CIA - often used with TLS

175
Q

Block Cipher CFB

A

Turns block cipher into stream cipher

176
Q

Null Pointer Dereference

A

Attacker gets app memory directed to null (no memory) causing it to crash and DoS

177
Q

SSH

A

Network protocol for secure data transfer, remote login, command execution, etc

178
Q

SRTP + RTP (Secure/Real-time Transport Protocol)

A

Protocol for trasmitting video and audio over internet. SRTP is the secure version

179
Q

FTP/FTPS (File Transfer Protocol Secure)

A

Protocol to exchange files over network/internet. FTPS uses SSL/TLS

180
Q

SNMP (Simple Network Management Protocol)

A

Protocol for managing/monitoring devices in a network. SNMPv3 is most secure, v1/v2 sent data unencrypted

181
Q

UEFI

A

Better replacement of BIOS. Better GUI and secure boot

182
Q

Trusted Platform Module (TPM)

A

New hardware section in computer that securely stores cryptographic keys and securing the platform, ensuring secure boot. Only one device

183
Q

Hardware Security Model (HSM)

A

Like TPM but only for cryptographic keys

184
Q

Tokenisation

A

Replacing security info with unique token like credit card number becomes Token123

185
Q

Resource Exhaustion

A

DoS attack involves taking up a lot of resources like memory so nothing works

186
Q

Network Access Control (NAC)

A

Says what is allowed on the network, prevents rogue access points

187
Q

HaaS (Hardware as a Service)

A

Provider gives you physical things like servers

188
Q

SaaS (Software as a Service)

A

A software service like outlook or gmail

189
Q

PaaS (Platform as a Service)

A

Platform for buuilding your own apps, gives you dev blocks, like a login page block, etc. Speeds up dev greatly - dont have to code every little thing

190
Q

XaaS (Anything as a Service)

A

Anythign that can be delivered over Internet/Network as a service

191
Q

Latency

A

Time between x being requested and x actually happening

192
Q

Virtualisation

A

Running multiple OS’ on same device, using VMs basically

193
Q

UC Server (Unified Communications)

A

Brings together different comm tools into a unified platform

194
Q

Transparent Proxy

A

User doesn’t know that there’s a proxy, everything is done automatically

195
Q

Nontransparent Proxy

A

User has to configure settings and work with the proxy. Usually used by users who want to anonymity or content filtering

196
Q

NAT (Network Address Translation)

A

Translates a bunch of private IP addresses into one public IP when going on the Internet. Conserves public IPs and helps security

197
Q

WPA3 (WiFi Protected Access 3)

A

Wifi and wireless network security enhancer. Gradual update from WPA2

198
Q

SAE (Simultaneous Authentication of Equals)

A

Key exchange protocol used in WPA3

199
Q

PSK (Pre Shared Key)

A

Key exchange security mechanism in WPA and WPA2

200
Q

WPS (WiFi Protected Setup)

A

Simple way of connecting devices to wifi like with a pin. Insecure, shouldn’t be used, susceptible to brute forcing

201
Q

WEP (Wired Equivalent Privacy)

A

Old version of WPA with tonnes of vulnerabilities, no longer used

202
Q

OTA (Over the Air)

A

Wireless delivery of software updates to mobile or IoT devices

203
Q

RCS (Rich Communication Service)

A

Better version of SMS, adds media, read receipts, etc

204
Q

CASB (Cloud Access Security Broker)

A

Intermediary between users and CSPs, monitors user activity and has security features like encrypting data, only authorised access, lists applications in use
Does not provide security for data on laptops/mobiles but all data transfer are encrypted

205
Q
A
206
Q

OpenID

A

Like OAuth but provides authentication, often used for SSO

207
Q

NTP (Network Time Protocol)

A

Synchronises time across all devices/networks

208
Q

NTPSec

A

Secure version of NTP

209
Q

SAN Certificate (Subject Alternative Name)

A

Certificate covers many domains, subdomains or hosts

210
Q

Wildcard Certificate

A

Certificate that covers different subdomains

211
Q

Key Escrow

A

Trusted third party that stores cryptographic key backups

212
Q

Recovery Agent

A

Retrieves keys from key escrow

213
Q

Certificate Chaining

A

Verifying authenticity of new certificates by checking up the chain to the root CA

214
Q

netcat

A

Windows/Linus command can be used for anything from banner grabbing, port scanning, file transfer and proxying

215
Q

Routing Table

A

Data table stored in a router with info on network destinations

216
Q

NXLog

A

Log management tool that centralises logs, collects, processes and forwards log data.

217
Q

NetFlow

A

Cisco network protocol that collects IP traffic info and monitors network traffic flow

218
Q

IPFIX

A

Standard for exporting traffic flow info from network devices, used for monitoring, anal and security. Contains info like src/dest IP addresses, protocols, ports and timestamps

219
Q

Syslog

A

Standard protocol for collecting and transmitting log messages in a network

220
Q

Syslog-ng

A

Open source syslog with better features like centralisation, message filtering, routine and processing

221
Q

rsyslog

A

Syslog for LinuxUnix with better features like filtering, input sources and output targets

222
Q

ISO 27001

A

Standard that gives guidelines to orgs on how to establish and maintain an ISMS to protect information assets

223
Q

ISO 27002

A

Supports 27001, gives guidelines on implementing infosec controls

224
Q

ISO 27701

A

Expands on 27001 to include privacy management, PIMS

225
Q

ISO 27702

A

Complements 27701, gives additional guidelines

226
Q

ISO 31000

A

Guidelines on risk management

227
Q

Partially Known Environment

A

Only know some stuff about the environment

228
Q

Partitioning Data

A

Splitting data up into smaller chunks based on xyz

229
Q

Kernel

A

Bridge between hardware and software and manages system resources

230
Q

ROM (Read Only Memory)

A

Non volatile memory and stores data even without power

231
Q

Process Table

A

OS stores this info which is every process running on the device

232
Q

MFD (Multi Function Device)

A

Like a printer, fax, scanner, etc all in one

233
Q

SoC (System On a Chip)

A

All components for a computer on one chip, like memory, CPU, etc

234
Q

MTTF (Mean Time To Failure)

A

Average time x thing can operate before a failure

235
Q

Watering Hole Attack

A

Attacker knows victim visits x site so they compromise the site to get to victim, also in real life scenarious like knows x person is going to a conference

236
Q

EAP-MSCHAP

A

Weak, often unused.

237
Q

head/tail commands

A

First/last 10 lines of file

238
Q

curl command

A

Retrives a webpage and displays as HTML in command line

239
Q

grep command

A

Search for text/x thing in files

240
Q

OpenSSL

A

Cryptography library that supports SSL/TLS encryption on web servers

241
Q

Scanless

A

Port scan using a proxy - not traced to you

242
Q

WAF (Web Application Firewall)

A

Intermediary firewall between web servers and incoming traffic. Mitigates SQL injection, XXS and CSRF

243
Q

CRSF (Cross Site Request Forgery)

A

Like malicious clickbait on website. Tricks user on legit site

244
Q

SSID (Service Set Identitifier)

A

WiFi name

245
Q

DNS Sinkhole

A

Route malicious DNS requests to a bum (sinkhole) server so it can’t cause damage, or devives trying to connect to C2 servers

246
Q

Measured Boot

A

Records the integrity of each component of boot process, creates a log of it

247
Q

Trusted Boot

A

Like measured but each component in boot process is signed with trusted key - prevents malware being executed

248
Q

Secure Boot

A

Enforces use of signed + authenticated bootloaders/OS components. Prevents unsigned/tampered code beign executed

249
Q

VDI (Virtual Desktop Infrastructure)

A

Virtual desktop (VM) that can be accessed on thin clients, mobiles, etc

250
Q

NGFW (Next Gen FireWall)

A

Traditional firewall functions with application control, intrusion prevention, advanced threat protection, user identity and SSL/TLS inspection

251
Q

LDAPS (LDAP over SSL)

A

Secure comms protocol that adds encryption to LDAP data exchanged between client/server

252
Q

PCI DSS

A

Standard for credit card security

253
Q

CSA CCM

A

Documents for implementing/managing cloud security controls. CSA is the nonprofit

254
Q

Polymorphic Virus

A

Virus changes itself each time it’s downloaded. Has to be installed by user

255
Q

IMAP (Internet Message Access Protocol)

A

Email protocol for accessing and managing emails on a server like Outlook

256
Q

PFS (Perfect Forward Secrecy)

A

Generating unique session key for each session. Past session keys can’t be used for future sessions and vice versa

257
Q

Data Owner

A

Senior person who decides who has access, usage policies, etc

258
Q

Data Processor

A

Follows instructions of data owner and processes on their behalf. Responsible for security measures during processing

259
Q

Data Steward

A

Individual/team responsible for day to day management/quality of data

260
Q

Data Protection Officer (DPO)

A

Mediator between org, data subjects and authorities. Monitors data protection, ensures org follows rules

261
Q

Elasticity

A

If system/infrastructure, esp in cloud computing, can scale up or down with demand

262
Q

Least Privilege

A

Bare minimum access/permissions needed to complete job

263
Q

FTK Imager (Forensic Toolkit)

A

Create forensic image of hard drive or USB

264
Q

Autopsy

A

Open source tool for analysing/investigating forensic evidence in user friendly way

265
Q

NIST RMF (Risk Management Framework)

A

Structure for managing cyber security risk in federal systems

266
Q

Resource Exhaustion

A

Lack of space in critical resources like CPU, network bandwidth or memory

267
Q

HIPS (Host Based Intrusion Prevention System)

A

IPS on a host, examines stuff like file modifications and network connections

268
Q

PGP (Pretty Good Privacy)

A

Widely used encryption program for data comms, usually email. Uses symmetric and asymmetric

269
Q

WAP (Wireless Access Point)

A

Lets wifi enabled wireless devices like phones connect to wired network via radio signals

270
Q

Out of Band Key Exchange

A

Swapping encryption keys off network, like over the phone for security

271
Q

VPN Concentrator

A

VPN that handles a bunch of connections

272
Q

Stored Procedures

A

Precompiled/stored SQL queries/statements saved on database for later use

273
Q

FAR/FRR (False Acceptance/Rejection Rate)

A

How many false acceptances/rejections biometric reader makes

274
Q

Data Masking

A

Scrambling or replacing identifiable data with pseudononymous data for anonymity

275
Q

OCSP/OCSP Stapling

A

Protocol that allows web server to check when certificates expires/gets revoked. Stapling is when OCSP responds and ‘staples’ response to the certificate

276
Q

Static/Dynamic Code Analyser

A

Static checks it without executing it, dynamic executes to find out

277
Q

Certificate Pinning

A

Pins SSL/TLS certificate/public key to a domain. Prevents MITM

278
Q

Buffer Overflow

A

Program writes more data than it was allowed to hold, causes crashes

279
Q

Integer Overflow

A

Number goes over alloted amount and causes issues like crashes

280
Q

MAC Cloning

A

Attacker copies MAC address of authorised device for impersonation, MITM or evasion

281
Q

Heuristics

A

AV studies how programs normally acts and flag it when they don’t act right

282
Q

Anomaly Based Detection

A

Anything deviates from baseline is flagged

283
Q

Behaviour Based Detection

A

Understands entity behaviour over time and flags when deviates from behaviour

284
Q

netview

A

Windows command to view every available resource on LAN like computers, servers and shared folders

285
Q

memdump

A

Dumping memory (RAM) into file

286
Q

chmod

A

Linux command for changing permissions of files and directories

287
Q

dd

A

Linux command for copying data from one locations to another and disk imaging

288
Q

Split Knowledge

A

Splits knowledge between 2+ people so no one knows everything

289
Q

Split Tunnel VPN

A

Some info through VPN like files some not like printer sent