Terms To Know Flashcards
Process that can be used to create a specific set of instructions for a computer to execute tasks
Programming
The interface between computer hardware and the user.
Operating system
Operating system that is open-source and can use the command line
Linux
A unique flaw in a web application that a threat actor could exploit by using malicious code or behavior that allows unauthorized access, data theft and malware deployment
Web Vulnerability
Software program used to prevent, detect and eliminate malware and viruses
Antivirus software
Application that monitors system activity and alerts to possible intrusions and analyzes network packets
Intrusion detection system IDS
Makes data unreadable and difficult to decode for an unauthorized user and ensures confidentially of private data
Encryption
The act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications and processes.
Penetration Testing
SIEM
Security Information and Event Management
An application that collects and analyses log data to monitor critical activities in an organization.
SIEM tool
It reduces the amount of an analyst must review by providing alerts for specific threats, risks and vulnerabilities.
SIEM tool
Provides a series of dashboards that visually organize data into categories, allowing users to select the data they wish to analyze.
SIEM tool
A tool designed to capture and analyze data traffic in a network. It keeps a record of all data that a computer encounters.
Network protocol analyzer (packet sniffer)
Manual that provides details about operational actions, like how to respond to a security incident.
Playbook
The process of documenting evidence possession and control during an incident lifecycle. Document who, what, when and where of an incident.
Chain of Custody Playbook
The process of properly working with fragile or volatile digital evidence by consulting the order of volatility
Protecting and preserving evidence playbook
A sequence outlining the order of data that must be preserved from first to last
Order of Volatility
First Domain of Security
Security and Risk Management
An organization’s ability to manage its defense of critical assets and data, and react to change.
Posture
Security Goals and Objectives
Risk Mitigation Processes
Compliance
Business Continuity Plans
Legal Regulations
Professional/organizational ethics
Elements of — Security and Risk Management
Second Domain of Security
Asset Security
Focuses on securing digital and physical assets and their storage, maintenance, retention and destruction of data.
Asset Security
Third Domain of Security
Security Architecture and Engineering
Focuses on managing data security by ensuring effective tools, systems, and processes are in place to help protect the organization’s assets and data.
Security architecture and engineering
All individuals involved take an active role in lowering risk during the design of a security system.
Shared Responsibility
Fourth Domain of Security
Communication and network security
Focuses on managing and securing physical networks and wireless communications whether they are onsite, remote or cloud.
Communication and network security
Fifth Domain of Security
Identity and access management
Focuses on keeping data secure by ensuring identities are trusted and authenticated and that users follow established policies to control and manage digital assets and physical spaces and devices.
Identity and access management
Sixth Domain of Security
Security Assessment and testing
Focuses on conducting security control testing, collecting data and conducting audits to monitor risks, threats and vulnerabilities. May audit user permissions and ensure users have the correct level of access to information.
Security Assessment and Testing
Internal users that are employed to find vulnerabilities that could be exploited by a threat actor
Penetration Testers
Seventh Domain of Security
Security Operations
Focuses on investigation of a potential data breach and the implementation of preventative measure after a security incident has occurred
Security Operations
Training and awareness
Reporting and documentation
intrusion detection/prevention
SIEM tools
Log management
Incident management
Playbooks
Post breach forensics
Reflecting on lessons learned
Strategies of Security Operations
Eighth Domain of Security
Software Development Security
Focused on using secure programming practices and guidelines to create secure applications. Secure applications deliver reliable services and help protect organizations and their customers.
Software Development Security
An item perceived as having value to an organization
Asset
Personal information of customers, Computers, Office spaces, people
Assets