Test Study Flashcards
CASB
Cloud Access Security Broker
applies security policies to the cloud
views application usage
enforces security policy
verification of compliance
802.1x
uses a centralized authentication server, and all users can use their normal credentials to authenticate to an 802.1X network
ABAC
Attribute Based Access Control
sets and enforces policies based on characteristics, such as department, location, manager, and time of day
DAC
Discretionary Access Control
the principle of restricting access to objects based on the identity of the subject (the user or the group to which the user belongs)
MAC
Mandatory Access Control
controls access to sensitive information in an organization
MAC grants access based on a user’s need to know. Users must prove they need the information before gaining access. The sensitivity of the resource is defined by a security label.
RBAC
Role Based Access Control
assigns rights and permissions based
on the role of a user. These roles are usually assigned by group
IPS
Intrustion Prevention System
a network security tool that monitors network traffic for potential threats
HSM
Hardware Security Module
Appliance used on the network to store certs and keys for all devices
TPM
Trusted Platform Module
A chip on individual computers that stores keys
ALE
Annual Loss Expectancy
SLE
Single Loss Expectancy
key escrow
storing decryption keys with a third party
hashing
one-way cryptographic algorithm that allows for the secure
storage of passwords
OSINT
open source intelligence
process of obtaining
information from open sources, such as social media sites, corporate
websites, online forums, and other publicly available locations.
footprinting
the process of using tools and techniques, like using the traceroute commands or a ping sweep – Internet Control Message Protocol sweep – to collect data about a specific target.
IPsec
commonly used as an encrypted tunnel between sites or endpoints.
It’s useful for protecting data sent over the network
Insecure Protocols
An insecure protocol will transmit information “in the clear,” or without
any type of encryption or protection.
Incident Response Process
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned
netcat
reads and writes information to the network
Obfuscation
Obfuscation is the process of taking something that is normally understandable and making it very difficult to understand. Many developers will obfuscate their source code to prevent others from following the logic used in the application.
Confusion
Confusion is a concept associated with data encryption where the encrypted data is drastically different than the plaintext.
Diamond Model
Intrusion Analysis
applies scientific principles to
provide a post-event analysis of an intrusion
memory leak
a gradual decline in a computer’s performance over time. It occurs when a program’s RAM is fragmented because it doesn’t free up memory segments when they’re no longer needed. This reduces the amount of available memory, which can cause the system to slow down or stop working correctly.
DDoS and injection attacks