Terms you should know Flashcards
Layer 2 device
aka multiport bridge
connects multiple network segments together
learns MAC addresses touching its ports
makes forwarding decisions like a bridge
switch
Also known as a multiport repeater and a Layer 1 device that connects multiple network devices & workstations. Broadcasts data to every computer or Ethernet-based device connected to it & transmits data from one device to another in the form of frames.
Hub
This hub repeats signals with no amplification
passive hub
This hub repeats signals with amplification
active hub
This hub has enhanced features like SNMP (simple network management protocol, which allows you to actively control the hub and configure it from a distance)
smart hub
Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC frames. Connects two LANS and has packets processed on MAC addresses inside the incoming packet
Bridge
Measures how many bits the network can transmit per second.
Bandwidth
Layer 3 device that connects multiple networks & makes forwarding decisions based on logical information, helps connect to Internet & other networks, and is all about IP addresses. Also separates broadcast domains
Router
Transmit (a program or some information by radio or television)
Broadcast
Blank is the most common form of malware. It
is how most other malware gets delivered. Blank
occurs anytime you have something with a known, desired function as well as an unknown, undesired function. For example, think of a login screen you use to login to a computer. Say that in addition to logging you in, it also sends your username and password to an attacker. The
login function is the known and desired action. Sending your credentials to an attacker is the unknown and undesired action.
Trojan Horse
Blank is also an all-in-one security
appliance. A perfect example of these devices is the “wireless router” we buy for our homes. While this device is indeed a router, it may also be a firewall, intrusion detection system (IDS), gateway anti-virus, dynamic host control protocol (DHCP) server, content filter, and many other
security mechanisms all inside one box.
Unified Threat Management
Blank is the practice of leaving malicious USBs
around and waiting for someone to pick them up and try to use them. These USBs have autorun scripts on them that will automatically install malware on a system the instant they are plugged into a computer. (Note: Windows supports
autorun scripts, though the feature can be disabled. (Note: Windows supports
autorun scripts, though the feature can be disabled. Mac does not support autorun at all.)
USB Seeding
Blank is when a cybersecurity professional
employs the same tools and techniques (except destructive methods) as a hacker in an attempt to gain access to a network, building, etc. Two big differences between criminal hackers and Blank are:
* Contracts—Blank have extensive contracts with their customers that give the penetration tester permission to perform the attacks, list what they can and cannot do, etc.
* Cleanup—Good blanks always clean up after themselves. Some tests may leave accessible vulnerabilities on a network that require repair. Criminal hackers do not care about contracts, permission, or cleaning up after themselves. The other significant difference is that a criminal hacker tends to cost an organization a great deal more than blanks do.
Penetration Tester
Blank is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a Blank management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data
Vulnerability Scan
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
Threat
The possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
Risk
Blank is a risk-assessment approach that assigns
hard costs to each risk. The approach utilizes mathematical formulas to calculate single-loss expectancy, annual-loss expectancy, etc. The method lends itself to communicating risk to management and cost justification, but it is impossible to predict the true cost of future events accurately
Quantitative Risk
the Quantity of Money
Quantitative Risk
The Quality of the Risk.
Qualitative Risk
Blank is implementation is when you place your
data on a cloud provider’s systems in such a way that they have “zero knowledge of your data.” To do this locally, you enter a very complex passphrase. That passphrase runs through a process to create an encryption key. The encryption key encrypts your data, and your encrypted data then uploads to the cloud provider. The cloud provider never has access to the passphrase or the encryption key the passphrase creates – hence they have zero knowledge of your data. At any time, you can enter the passphrase, download your data, and decrypt your data.
zero knowledge
is a code that takes advantage of a software vulnerability or security flaw
Exploit
Blank is an attack against a computer that is
only known by the person who discovered it. The person who discovered the attack or exploits has not notified the vendor, so they do not know to work on a solution. Since the public (including you) do not know about the attack, you do not know to protect yourself from it.
Blank have now become a commodity bought and sold on the dark web. Google, Microsoft, and other companies also have “bounty programs” that will pay for the disclosure of blank.
zero day exploit
is a risk-assessment approach that
utilizes a team of subject-matter experts (SMEs) and questionnaires to rank each threat according to likelihood and impact. The answers from the SMEs go into a severity scale that helps the cybersecurity team to prioritize concerns and assign resources effectively. The method is
difficult to communicate the results to management, but it is very straightforward to perform
Qualitative Risk Assessment
Blank is a mathematical formula (algorithm) run against an input file. It is used in cryptography to check the integrity of a message or a file. When you “hash a file”, you run the hashing algorithm against a computer file and receive a fixed-length output called a hash or fingerprint of the file. A
good hash algorithm provides all of the following:
* When you use the same algorithm, you always get the same length output, regardless of the size of input
* Every time you hash the exact same input, you get the
exact same output
* If you make even a tiny change to the input your output is completely different (called widely divergent)
* It is extremely fast to calculate a hash regardless of the size of the input
* It is mathematically impossible to use the output to recreate the input
* It is extremely unlikely that two different inputs will create the same output
* The blank algorithm does not modify the input in any way
Hash
Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability. Malware or a bank robber is an example of this
Threat
A process used to identify and prioritize risks. It includes quantitative risk assessments and qualitative risk assessments
Rsik assessment
The practice of identifying, monitoring, and limiting risks to a manageable level. It includes risk response techniques, qualitative risk assessments, and quantitative risk assessments.
Risk Management
The process of reducing risk by implementing controls. Security controls reduce risk by reducing vulnerabilities associated with a risk, or by reducing the impact of a threat.
Risk Mitigation
A tool used to detect vulnerabilities. A blank can typically identifies vulnerabilities, misconfigurations, and a lack of security controls. It passively tests security controls.
Vulnerability Scanner
A weakness. It can be a weakness sin the hardware, the software, the configuration, or even the users operating the system.
Vulnerability
Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability
Threat
The possibility or likelihood of a threat exploiting resulting in a loss
Risk