Terms Flashcards

1
Q

Abstraction

A

Streamlining authorization access aka permission, abs and social media streamline access to pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gap

A

Analysis of current system in comparison to future want. Like bitch with a gap tooth, she wants to fill that bitch so in the future she cute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control Plane

A

Configurations of zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data plane

A

Movement of data, aka switch like the physical part/ Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Honey pot

A

Attracts attacker to fake machine. Honeynet consist fake network. Honey file, fake info to alert. Honey token, track location/alert of attacker (anything posted on internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change management

A

Formal way to change/update applications, policies make sure it’s done right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Change control process

A

Changes can only be made listed within a scope of change control document. Document can be altered so changes needed can be made. Like upgrade if you need to do something not listed, then you can change the scope to match the necessary thing you need to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Change control board

A

They approve changes to application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PKI

A

Public key infrastructure, framework for digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Escrow

A

Maintains decryption key. Like Crow at work maintainers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transparent vs Record lvl encryption

A

Encrypts all data base daya with symmetric vs encrypt individual with different symmetric key for each (sql)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key stretching

A

Hash a password, then hashing the hashed password… the doing it again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Out of band key exchange vs in band

A

Phone, person, cyber transport NOT OVER INTERNET. OVER INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key cryptography

A

Create same key without key exchange. So on Anderson computer he has his own private key and mix it with Perez public key = symmetric key. Other way around too on Perez side. This creates same symmetric key without exchanging over Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TPM

A

Trusted platform module. Encryption generator w/ hardware SINGLE device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HSM

A

Hardware security module. LARGE SCALE redundant cryptograph device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key management system

A

Manage all keys in centralized software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Secure Enclave

A

Professor built into devices, keeps phone private (encrypts things in device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Obfuscation

A

Making something difficult to understand, hides data in plain sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Steganography

A

Concealed writing, hides data in image. If you know how it’s done, you can reverse engineer it. Can be in network form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tokenization

A

Replaced sensitive data with non sensitive place holder. Like credit card when you pay, you use your card and a one use token 123 to 234 then it can’t be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data masking

A

Hide part of original data, like checking out in booking it’s XXXX 1234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hash

A

Digest or finger print, cannot recover original document. Integrity. If any change is made to original the hash changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hash collision

A

Two different string of text put in. Using MD5 it creates the same hash… don’t use MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Salted hash
A hash but with a little more additional random data as security. Rainbow table (every conceivable combination of hash) don’t work on salt hash
26
Digital signature
Integrity, authentication, non repudiation (not fake). Message is hashed then signed with senders private key = digital signature
27
Blockchain
A distributed ledger (database shared across multiple sites and keep track of transactions). So if someone sends bitcoin then everyone in that ledger get a receipt basically, if it’s changed by one person… then it makes it invalid.
28
Digital certificate
X.509 Public certificate, given by CA (certificate authority). Web of trust another form which individuals sign off on it, the web of friends is trusted
29
Root of trust
Security of trust use by 3rd party saying this website is good
30
Certificate authority
CA a trusted third party, they give websites certificate. So the check mark on google
31
CSR
Certificate signing request, a request by website they give their private and public key, the CA signs it with CA private they
32
SAN
Subject alternative name or wildcard certificate. Certificate can be used for many different domains, if it’s listed
33
CRL
Key revocation list, list of revoked certs
34
OCSP
Online certificate status protocol, large scale “stapled” means it’s digitally signed by CA. Status of certificate checked by browser
35
National state
Gov is APT advance persistent threat. They mostly do war like shit
36
Shadow OT
Working around orgs built in rules, no knowledge of rules that impact org
37
Threat vector
Method used to gain access to system
38
Phishing
Fake link that looks like official site
39
Social engineering
Invoice scam, they make you do something to gain info
40
Removable device vector
Can get through network that’s air gap (not network connection) bypass firewall
41
Agentless
Not installed in computer, need to connect to system (Internet) which infects computer via online
42
Supply chain vector
3rd party to be in infrastructure, via Managed service provider (MSP) so they infiltrate 3rd party system, like target
43
Supply chain vector
3rd party to be in infrastructure, via Managed service provider (MSP) so they infiltrate 3rd party system, like target
44
Spoofed
Non legitimate, fake. @us.al.mil
45
Typo squatting
Hijack the website link but a small typo. Pornhub.com to pronhub.com
46
Pretext
A pre story leading to scenario to steal info
47
Fraud
Use your Identity
48
Fraud
Use your Identity
49
Watering hole
Coffee shop using 3rd party site, the scammer tries to gain access to bakery connection. The mfs poison the watering hole to get you coffee shop
50
Misinformation
Factually incorrect, influence campaign - move public opinion on political, national state actor - distract/divide nation
51
DLL
Dynamic link library, runs and injects code applications use
52
Buffer overflow
Attacker writes more memory into system memory, waste resource. Adds to 8 bit data an high jack permissions. More than 8 bites then that’s an over flow
53
Race condition
Two events happen at the same time, issues basically the system doesn’t know two events are happen in at the same time. Paying Amex, the delay of updating on bank but it’s immediately in Amex, the balance still didn’t change so that’s the race condition… mf did not update. Potential to use up that money that’s not there TOCTOU time of check to time of use attack - application retrieve info and does something with it… but then behind the scene something happens from the time you checked and the use. Basically when you use info, and it changes without you knowing.. now you are using info that’s different from what you needed
54
Code injection
adding own info into application
55
Code injection
adding own info into application
56
SQL Injection
injects data into input field into SQL, even on browser Password or ‘1’ = ‘1 a SQL injection… input. Test using webgoat.org
57
SQL Injection
injects data into input field into SQL, even on browser Password or ‘1’ = ‘1 a SQL injection… input. Test using webgoat.org
58
XXS
Cross site scripting, security flaw in website. Using java script. Ex Attacker sends link with mf script, the link takes it to legit site but extra malicious script is also executed to obtain data so its a legit site with an attached script and both run at the same time.
59
Non persistent XSS attack
3rd party site that allows attacker to run script into trusted website input user block, which is the flaw. Attacker sends link to mf and they click it with the script embedded into site. So like user name input embedded with a code.
60
Persistent XSS attack
post trusted link with malicious code, everyone sees the payload…injected script is permanently in server
61
IoT
internet of things, shit connected to the network/internet
62
Firmware
OS in hardware. Only vendors can fix hardware
63
EOL/EOSL
end of life, manufacturer stops selling a product. End of service life, no more support/update way more significant than EOL.
64
VM Virtual Machine
self contained
65
VM Escape
break out of one VM and get into another VM.
66
Resource reuse
Allocate physical and virtual resource effectively
67
MFA
multi factor authentication
68
Directory Traversal
configuration vulnerability, moves structure of webserver application to different directories
69
Out of bounds write
able to write code into memory unauthorized
70
Target service provider attack
provider of target gets attacked… like IT Finance, then that can get into Targets whole system
71
Linux root account
Admin or Super User (usually easy password to hack) so use su or sudo with elevated access
72
Packet capture
view everything sent over the network, using wall of sheep which is a wall of protocols sent over a network so it removes insecure protocols
73
Mirai Botnet
takes advantage of default settings on devices via Internet of thing (IoT) aka devices that exchange data connected to Internet like home application or printers. It’s open source too
74
Jailbreaking/rooting
replaces existing OS with 3rd party OS. All security gets fucked
75
Sideloading
installing application to app and one malicious app will fuck up your phone, this only happens when you jailbreak and go away from official Application downloader like app store
76
Zero day attack
an attack without a patch.. Or a new vulnerability with no patch. Unknown patch yet
77
Script viruses
Operating system/browser base
78
Stealth attack
no installation but it operates in memory. Bruh tbh its like the mail that wont go away 1.
79
Worms
no user interaction and the only way to stop it is firewalls. Wannacry worm rare - infect all systems inside network with same random ware.
80
Spyware
spys on you aka watch everything in system advertising, id theft. Install malwarebytes
81
Secure boot
with UEFI bios has secure boot that will stop root kit even installed
82
DDos
C&C (command and control) uses a fuck ton of computers (botnet) to use all bandwidth/ traffic spikes. Asymmetric threat or attacker has way less resources to attack large resources.
83
DNS poisoning
attacker taking over DNS (domain name server or name of website) pronhub.com and change IP of original website to its IP and everyone that checks the original will be routed to the attackers IP/ server.
84
Domain hijacking
hacker accesses domain registration and its a form of DNS poisoning. Basically they can route users to their IP by changing original IP to theirs.
85
URL Hijacking
jacks mispelled domain of original or redirects users to attackers site. Aka typosquatting a misspelled word to similar
86
Wireless deauthentication
a DDoS of network, boots you off network 802.11 management frame gets fucked, this framework enables wireless connectivity. 802.11ac encrypted aka updated
87
On-path attack/man in the middle attack
attacker is in between traffic and can see traffic
88
ARP poisoning (spoofing)
attacker copies IP of router to user and users device thinks its the router and updates storage with attackers IP now attacker has access to users computer.
89
On-path browser attack
middleman was on the same device as user by using malware. Man in the browser, malware is configured as a SERVER. It then routes info to attacker.
90
Replay attack
when attacker obtains information like user info and they replay that data to be used (browser cookies cause it stores info).
91
Pass the hash
victim sends authentication and attacker gets copy of data… they can replay it to the server posing as the victim.
92
Session hijacking
victim tries to access server and the server gives ID back… but the attacker gets it and replays it and accesses server with victims info
93
Header manipulation
session ID is stored within headers sent back and forth within system. Can be exploited using wireshark which can also be modify
94
Injection attacks
adding extra info to victims data
95
Buffer overflow
adding buffer of memory and spills over to other memory areas
96
Horizontal privilege escalation
attacker moves from A access to B resources
97
Data execution prevention
prevents data being executed on areas that its not allowed
98
System privilege
highest privilege in windows
99
Cross-site request
request are legit at a common site… but all its being loaded from different servers. Client sees only GUI and Server they process shit internally like youtube viewer vs youtuber
100
Cross-site request forgery
one click attack or session riding (XSRF or CSRF). Trusted browser by server so attacker can use your BROWSER specifically. Ex. I get an email about amex to transfer funds and I click the link, I log in and the bank gets the request, then that fund transfer goes to the attacker
101
Directory traversal
misconfigured web configuration on one directory folder then the attacker can gain access to one directory thats fucked then it can go through the other directories. ../ code means go back one directory… bruh basically they access one directory thats fucked then can jump directories
102
In the clear
password not stored in an encrypted application
103
Message Digest
hash data as fixed-length or a fingerprint basically a hash (SHA-256) and that shit cant be fucking reverted.
104
Spraying attack
mfs trying top 3 passwords 12345…123456….qwerty lolll using weak password. No lockouts or alerts
105
Brute force
trying every possible combination till the hash is matched. Mf has the HASH now trying passwords to match HASH obtained
106
IOC
indicator of compromise, like network activity or login patters or changes in local client
107
Segmenting network
users not talking directly to database server but only the application
108
ACL
access control list, allow or disallow traffic through your network. Basically put details like port number/ application. Limiting IP or users
109
Allow list
nothing runs unless approved. VERY RESTRICTIVE
110
Deny list
nothing on the bad list can be executed. Anti Virus, allows everything to run except what is listed
111
EFS
Encrypting file system, OS encrypt data or file. Built in integrated encryptor. File level encryption
112
FDE
full disk encryption, encrypt everything in system like OS and files
113
Application data encryption
encrypt stored data in application
114
SIEM
security information event manager, central system of logs to monitor data
115
Least privilege
writes and permissions of user is the bare minimum.. TF you give them admin rights..
116
The endpoint
users access to application and data. My computer
117
EDR
endpoint detection and response, detects a threat via behavior analysis, basically its like AI type deal
118
Root cause analysis
performs studies on threat and kills that mf
119
Host-based firewall
software based firewall, runs on every endpoint. Controls incoming data or outbound. Views all data before encryption. Monitors and can block stuff, it runs on all devices but is controlled on one central device
120
HIPS
Host based intrusion prevention system, blocks known attacks, it also checks request coming into system and IDs issues in OS, it can alert and block modifications
121
Nmap
scans open ports in system
122
Hybrid cloud
more than one public or private cloud
123
Network protection mismatch
cloud providers dont talk directly, youll have to configure platforms to match each other between different providers
124
Vendor risk management policy
in cloud if we want to use like an added safety feature… we use a third party vendor, have vendor risk management policy to maintain risk
125
Infrastructure as code
defines server, network, and application as code. Easily modified via code
126
Description code
after creating cloud code, then you can use that code in every cloud application and keep rebuilding the same one. Build application instance - an application infrastructure that is its own entity.
127
FaaS
Function as a service, no OS can run in any OS. Only run when needed. Serverless architecture.
128
Monolithic applications
one big application that does everything. USER interface, data input, and output.
129
API
application programming interface a type of micro service. Basically you can separate application into sub categories or micro services. It basically connects two or more softwares to communicate with each other.
130
Air gap
physically separated from one device or another and prevents communication with each other…
131
VLAN
Virtual local area networks, separate devices physically basically configuring switch to segment between VLANS so A and B are physically segmented from each other.
132
SDN
software defined networking, enables network to be centrally controlled or programed using software. Part of planes of operation in cloud. Basically this thing defines hardware into functions and use those functions to become software in cloud. So like a function of a computer or server is physical, so you program it into software aka cloud to do a computer or server job.
133
Data plane
process network frames and packet aka forwarding data. This is the infrastructure layer.
134
Control plane
manages actions of data plane, tells data plane how to process data from one place to another. It has routing tables (router). Control layer.
135
Management plane
configure and manage the device via SSH, browser, API. The management plane. Application layer.
136
Planes of operation
network devices have different functions like data, control, and management planes.
137
Switch operations
ports is data plane, control plane look up tables and address translations for data plane to operate, all need to connect to management console aka management plane.
138
SDN Security
create security in cloud network.. Like firewalls and shit.
139
On premise security
full control in house, usually has IT team that manages security but is expensive. Modification of security posture can be made and customized.
140
Decentralized security
systems are all in different locations/cloud providers/ or OS. Very difficult to monitor and managed.
141
Centralized security
can view in one location but single point of failure.
142
Virtualization
run many different OS on the same hardware. Each virtual machine though needs its own OS. So they'll run on an infrastructure (physical device) then hypervisor (software). Kinda expensive cause youll have to run separate OS to each virtual device.
143
Application containerization
have multiple application runs on one area but NO OS. Basically you can swap since it all runs on one OS. They cannot see each other though since its in a sand box (self contained)
144
Hypervisor
manages resource on each virtual machine.
145
IoT
internet of things, devices connected to network. Apple watch or Alexa. Easily exploited though
146
SCADA/ ICS
Superviory Control and Data Aquisition System or large scale multi-site industrial control system. Anyways computer manages all equipment.. MRM on gang. No access from outside.
147
RTOS
real time operating system, a deterministic process meaning no wait time for process, like breaking in a military vehicle, theres no waiting it just does it asap rocky
148
Embedded system
hardware and software designed for one sole purpose. Apple watch, traffic lights, theres no direct access to OS, like MRI.
149
HA
High availability, always on and available. Like a failover system
150
Resilience
how fast equipment can recover from down time
151
MTTR
mean time to repair, how long itll take for component can be replaced if it breaks
152
Scalability
or elasticity how quickly we can expand and contract application
153
Risk transference
transfer risk to a 3rd party, cyber security insurance, basically can recover downtime or financial loss. Even legal issues.
154
Jump server
access secure network, from the outside so you have an external device and jumpserver inside to route client in. Jump server hardened hella
155
Proxies
sits between user and external network. So user sends request and the proxy server sends request to internet then it filters that mf before getting back to client.
156
Explicit proxy
needs to be configured in OS, we are explicitly configuring the name of that proxy
157
Transparent proxy
invisible dont need to be configured, automatically makes request
158
NAT
network address translation, convert between internal and external. Works when there is a private network separated from public network NAT enables private IP network to use internet and cloud.
159
Application proxy
understands the protocol used for a specific application so like website it uses HTTP
160
Forward proxy
internal proxy, request from the internet and then it checks the data and if it is good then it sends the data to the user
161
Reverse proxy
inbound traffic from internet to internal service webserver. So like internet requesting pron data the proxy from pron will ask the webserver the pron data storage.
162
Open proxy
internet to proxy and to internet the proxy 3rd party can be adding code. So you ask internet to get pron, the internet will go to a 3rd party and the 3rd party will route to internet. So its inbetween 2 internet. That aint good cause they can add shit to it. Like henta that has links and will reach to other henta
163
Load balancer
keeps load even on multiple servers. Active/active load balancer means all servers are all active and it can distribute to any of the open servers to balance the load
164
TCP offload -
protocol keeps servers open and doesnt have to make a request. Load balancing.
165
SSL offload
encrypt/decrypt. The load balancer removes SSL encryption from traffic coming in so servers dont have to keep decrypting data. Load balancing.
166
Caching
fast response due to temporary storage
167
Content switching
can send request depending on need
168
Active/passive loading
some servers are active and some are passive, if active fails passive takes over. Load balancing
169
SIEM
console that collects data from all devices in a network. It reports data across all devices.
170
EAP
extensible authentication protocol, authentication framework for port security. AUTHENTICATOR request and response
171
NAC
network acess control or IEEE 802.1X, cant access network or port till you authenticate w/ 802.1X
172
Port security
switch to wireless network port
173
Supplicant
client
174
Authenticator
device that provides access
175
Authentication server
validates client
176
Network-based firewalls
filter traffic by port number or application, VPN
177
UTM
unified threat management, all in one security appliance a web security gateway. Filters URL and content layer 4
178
NGFW
next generation/deep packet inspection firewall layer 7 can make decisions based on application. Every packet is analyzed. Control traffic flow based on application. Fuck the ports bro I make decision based on apps. Content filtering via website traffic so pron
179
WAF
web application firewall, based on HTTPS with allows or deny based on expected input. Basically it can prevent SQL injection.
180
VPN
encrypted data going through public network. Data getting added new header and trailer sandwiching data.
181
Concentrator
end point everyone to connect to, encryption/decryption access device. Basically middle man to connect users to company network. Removes encryption.
182
SSL VPN
secure socket layer in port 443. Part of OS. Used mostly from coffee shop internet to company
183
Site-to-site IPsec VPN
always on so remote site will always be able to connect to corporate network automatically
184
SD-WAN
software defined networking in a wide area network, a WAN built for the cloud. So servers are able to jump from one site to another and not just to one data center.
185
SASE
secure access service edge, next gen VPN to communicate to other web based applications. SASE added on all applications and now you can jump to any cloud services you need connected to it. So like amazon AWS it got all the damn services for cloud, you can access all that using SASE cause it connects you to all of that. Connected to DS-WAN.
186
Regulated data
managed by 3rd party
187
Trade secrets
unique to the organization like secret formula
188
Intellectual property
other people are able to see but use of copyright and trade marks
189
Legal info
PII, court records, and documents. Can be stored private or other publics sources
190
Financial info
bank record, transactions
191
Non-human readable
not easily understood by humans. CSV, JSON.
192
Proprietary
data only used by that specific org or property of an organization, unique to them.
193
PHI
health details of person
194
Sensitive
PII, PHI, Intellectual property
195
Confidential
very sensitive, must be approved to view
196
Public/unclassified
no restriction on viewing data
197
Private/ classified/ restricted
restricted access may require an NDA to access data
198
Critical
data should always be available
199
Data at rest
storage device, hard drive, SSD, flash drive. Can have access control list where only authorized users can access the data
200
Data in transit
data moving from one place ot another. Use firewall and encryption
201
Data in use
use in active memory like RAM and is always decrypted usually easily hackable
202
Data sovereignty
data stored in country and is subject to that country
203
GDPR
general data protection regulation, european rules where data collected on EU citizens must be stored in the EU
204
Firewalls
seperat trusted from untrusted
205
Attack surface
potential opening to attack our network. Like open ports
206
IPS
intrusion prevention system, watches network traffic and blocks it
207
IDS
intrusion detection system, alarm/alert
208
Fail open
data will flow still if the system fails, availability but down on security (network still open)
209
Fail closed
system fails and data doesn't flow (network is cut)
210
Active monitoring
system is connected inline basically internet, firewall, IPS. Everything runs in a line like a step by step process before getting into the network. Blocks traffic might not be good in some cases
211
Passive monitoring
switch takes copy of network traffic to IPS then to destination in the system, it is in spider web not in line. Data cannot be blocked in real time and doesnt slow down data traffic. Issue is that it doesnt prevent issue from going to destination cause itll be copied then sent to server then destination nothing stopping it
212
Geofencing
automatically allow or restrict access if they are near the office or not
213
In the clear
open and not encrypted
214
Ciphertext
encrypted data
215
Confusion
encrypted data is different from plaintext (its just text to encryption)
216
Message digest
finger print of hashed data as short string of text
217
SHA256
256 bits aka the hash, if changed then the whole shit changes (strong)
218
Segmentation
separates data sources in different location prevents single point of failure
219
Permission restrictions
control access to the account aka permissions you have on an org account, minimum shit you need to do before you can log in then after logging in what you are authorized to access
220
High availability
always on incase main fails, good but expensive
221
Server clustering
combines two or more servers operates as one single server, good for redundancy. They know they all exist all OS same
222
Load balancing
a device that distributes to multiple servers and the server dont know that each exist. Can be in different OS load balancer makes decision.
223
Hot site
exact replica of main site and it is located somewhere else
224
Cold site
no hardware just an empty building
225
Warm site
in between hot and cold, it has enough to keep things going
226
Platform diversity
all OS has potential issues, basically area has different platforms so if one OS is fucked then the other is fine
227
Multi-cloud systems
uses more than one cloud provider
228
COOP
continuity of operations planning - when shit dont go according to plan, like a random disaster to there needs to be an alternative when something fails
229
Capacity planning
match supply to demand, too much demand application slows down and too much supply means too much cash, need to balance
230
Infrastructure
the frame work of apps, server, network Basically base for an office
231
Recovery testing
scheduled update or event for recovery testing aka to recover shit if it fails.
232
Tabletop exercises
collab with other organizations and compare logistics of their recovery exercise to ours. No physical disaster but comparison of statistics
233
Fail over
plan for the worse, aka redundancy to when shit fails then it goes to another service to keep going… bruh I know this one
234
Simulation
test with a simulated event, the bullshit phishing email that pisses everyone off
235
Parallel processing
single computer with multiple computers to handle multiple transactions, you basically spread the job and can improve recovery
236
Onsite backup
no internet link required, immediate data available less expensive
237
Offsite backup
transfer over internet, can be restored anywhere even after disaster
238
Snapshots
in cloud based environment, a snapshot or an instant back up of an entire system. Effective snapshot every 24 hrs. Can be reverted back to any snapshot
239
Recovery testing
need to be able to restored, disaster simulation then restore from backup. After application needs to be able to use data
240
Replication
real time backup, keeps data synchronized in multiple locations, apple data which changes with the live data. Can be replicated on all remove sites
241
Journaling
power goes out while writing data to storage, data gets corrupted… so you journal which kinda writes data to journal aka storage then it goes into the actual system so google drive then to computer
242
UPS
short term backup power or drop in voltage called brown out or excess voltage aka surge
243
Offline UPS
or standby when equipment is running on main but then it shuts off the offline comes on
244
Line-interactive UPS
increase little by little when voltage drops
245
On-line UPS
double conversion UPS is always on from main power to back up powe
246
Secure baseline
all applications must follow a baseline of security like updates and OS versions. Microsoft security compliance tool kit (SCT) useful knowing secure baseline
247
Deploy baseline
how we deploy the baselines aka like updates to all devices
248
Maintain baselines
basically updates, avoid conflicts with other company environments. If you install a new OS then you need new baseline. Make sure you audit and that what you did is being maintained.
249
Hardening
default is never secure, manufacture usually has guides for device.
250
Mobile devices
bux fixes and security patches, definitely company uses segmentation aka company and user data is seperated
251
MDM
mobile device manager an all in one application that updates devices and shit
252
Workstation hardening
monitor the laptops forsure and make constant updates, have a policy management system a fancy way to say being in a system that has a policy that is secure, and remove unused applications
253
Network infrastructure hardening
switches and routers, the best way to protest it is not to use default settings, the manufacturer issssss the only one the only one that has security updates.
254
Cloud infrastructure
a cloud management workstation is needed and need least privilege on all of them meaning they all have minimum permissions
255
EDR
ENDPOINT DETECTION AND RESPONSE, all devices monitor all devices ACCESSING cloud
256
C2C
cloud to cloud aka back up to a different cloud provider
257
Server hardening
updates using service packs or updates. Limit user accounts also set policy to limit what devices can access servers. Use anti virus too
258
SCADA
supervisory control and data acquisition system the same as ICS, large scale industrial equipment or EUR3, a platform that controls and manages energy, logistic, all that shit. Monitored by DCS and is usually no access to the outside world. MRM
259
ICS
industrial control system, large scale industrial equipment or EUR3, a platform that controls and manages energy, logistic, all that shit. Monitored by DCS and is usually no access to the outside world. MRM
260
DCS
Distributed control system - used by SCADA and ICS a monitoring system with real time information and system control
261
RTOS hardening
real time operating system,no wait time for process. Military type shit, should be isolated from other areas so they run only for what is needed. Use host based firewall
262
IoT hardening
heating and cooling that bullshit, just change the passwords and dont use default… should change my printers info lol. Put them on their own VLAN
263
Site surveys
determining existing wireless landscape, so ID access points that may or maynot be part of your network, sometimes they are just near your network. Use heatmap, ID wireless signal strength.
264
Wireless survey tools
shows signal coverage like how good a signal is and potential interference. Built in tools or can use 3rd party too
265
MDM
mobile device management, manage device by company or user owned mobile. Centralized management of all mobile devices and set policies or partition aka segment areas of the phone. Use manage access control or pins/screen lock
266
BYOD
bring your own device, bring your own phone and shit can be used for work or user pron needs. Its mostly used for work but y ou use your own device needs to meet company requirements
267
COPE
corporate owned, personally enabled. Company buys device for you but it is configured for corporate and personal… weiirrddd
268
CYOD
choose your own device, same as COPE but the company says hey bro you can choose your phone
269
Cells
so 4G and 5G means separation of coverage. Like 5G can be in france and 4G in america these are separated aka thats why they are called Cell phones
270
Bluetooth
high speed communication over short distances, PAN personal area network. Used to connect from one device to another.
271
Secure wireless network
not everyone is allowed, encrypt, use authentication, and integrity
272
MIC
message integrity check, any traffic sent is received properly.
273
WPA2 PSK
encryption protocol, encrypt data but there is an issue with initial connection. So they capture the hash and use a brute force to get the PREEEE-shared key (PSK). They basically listen to a 4way handshake to get the PSK.
274
WPA3
WIFI protected Access 3 an updated WPA2, uses GCMP a Galiois message authentication code… stronger encryption basically
275
SAE
simultaneous authentication of equals, so the preshared key is no longer an issue, uses mutual authentication so both computers communication can both create the same key on both sides so they dont need to use online.
276
Wireless authentication methods
PSK (your default password aka initial password to connect to network) and 802.1x authentication. Configuration also is used.
277
Wireless security mode
open system means no authentication/password required. WPA3-PSK (personal) everyone needs the same pre-shared key or 256-bit key. WPA3-802.1x (enterprise) the server will authenticate each server
278
AAA framework
this is a server that lets mfs in usin ID person user name, authentication aka password, authorization aka what access, and accounting or logs
279
RADIUS
(remote authentication dial-in user service, the most popular AAA protocol which is a centralize authenticator for users. Its just a server that authenticates people. THIS IS AN ACCESS DATABASE SERVER
280
IEEE 802.1X
part based network access control (NAC), the prompt we get for our user and password is 802.1X. You do not get access to the network till you authenticate used in conjunction with an access database aka RADIUS.
281
EAP
extensible authentication protocol, an authentication framework. Combines with 802.1X… EAP imbeds authentication protocol into 802.1X can be tailored to use of company
282
Quality assurance
testing testing to find vulnerabilities and shit
283
Input validation
inputs bullshit to see if it works or not.. Aka it shouldnt. Like character or character input matches what needs to be input. Like password some wont let you without following what they ask.
284
Fuzzing
will put random data in input and if one slips then they can fix it
285
Secure cookies
info stored in computer by browser for tracking, personalization, make sessions easier to open.
286
SAST
static application security testing, test code of an application by running the code to analyze vulnerabilities. Can have false positives… or say there is something wrong… but it isnt
287
Code signing
CA signs developers public key and signs code with the developers new private key so you know that the application is good
288
Acquisition
request first, negotiate, then purchasing right after.. Idk if this is even needed
289
Central asset
tracking system manages all assets receive by company and track life cycle of devices. Ownership - gives name to asset so we know who got it.
290
Classification
Hardware (capital expenditure)/ Software (operating expenditure). Label take taxes into consideration basically hardware depreciate and software dont
291
Enumeration
list all parts of one whole asset like mf computer will all the cpu, memory, keyboard and shit
292
Media sanitation
disposing of data make sure shit is wiped. Delete everythingggg unless you just reusing it in company just delete things that need to be deleted
293
Degaussing
electro magnetic field to destroy mf hard drive data
294
Certificate of destruction
3rd party drills and degausse and will have a certificate that all devices are fucking broken
295
Data retention
back up of data a certain amount of back up is required and be in regulatory compliance.
296
Vulnerability scanning
not pentesting but it just say theres a potential an attack exist… like a port scan to show if a port is open.. Test from outside and inside of network.
297
SAST
statistic application security testing, reviews source code to ID vulnerabilities like an injection. They cannot see encryption or authentication security
298
Dynamic analysis
or fuzzing, sends random input to application, like faulty injection to see if the application crashes or does something out of normal. Can use CERT (emergency response team) its a fuzzer website
299
Threat intelligence
research the threats and actors
300
Open source intelligence (OSINT)
anyone can access and see open source threats. Internet or government data or commercial data aka databases
301
Proprietary intelligence
or third party intelligence a threat intelligence service you can buy that source already did analytics on threats coming from other companies that have new threats
302
Information sharing
public threat intelligence was classified now made public and private company usually have extensive resources.
303
CTA
cyber threat alliance, group of oranization that gather details about threats and send it within their shared contacts and they score those submissions and other members can score the threats themselves
304
Darkweb intelligence
overlay network that uses the internet you can see hacking groups and services. Monitor forums in dark web to see if their shit is on it.
305
Pentest
simulated attack, aka actual attack to exploit vulnerabilities. National Institute of Standards and technology (NIST) a guide for pentesting