Topics Flashcards

1
Q

MTBF

A

Mean time between failures. It is the average time between system breakdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MTTR

A

Mean time to respond. It is the average time it takes to discover a security threat or incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RTO

A

Recovery time objective. It is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPO

A

Recovery point objective. It generally refers to calculating how much data loss a company can experience within a period most relevant to its business before significant harm occurs, from the point of a disruptive event to the last data backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SCAP

A

Security content automation protocol. A multi-purpose framework of specifications supporting automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement.

Examples: Nessus, OpenSCAP, OpenVAS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVE

A

Common vulnerabilities and exposures. The mission of CVE is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CVSS

A

Common vulnerability scoring system. It provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDCC

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IdP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OVAL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tcpdump -w -r -n -e

A

write, read, network address information in numeric format, option to include the data link (ethernet etc) when performing a packet capture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insecure de-serialization vulnerability

A

When an attacker loads untrusted code into a serialized object, then forwards it to the web application.

17
Q

Rainbow Attack

A

Cracking method that uses a special table (a “rainbow” table) to crack the password hashes in a database.

18
Q

Dictionary Attack

A

Breaking into a password-protected system by systematically entering every word in a dictionary as a password.

19
Q

Hybrid Attack

A

Perpetrator blends two or more kinds of tools to carry out the assault. Example - dictionary + brute force attack = rover123, purple6!, 123Password

20
Q

Collecting evidence for forensic examination sequence

A

CPU Cache, RAM, SWAP, Hard Drive

21
Q

printenv

A

Linux command. Prints value of environment variable specified. (Like alias etc)

22
Q

COSO

A

Committee of sponsoring organizations. Safeguard organization’s assets against fraud.

23
Q

Serialized Object

A

Converting state of an object into a byte stream. Can create copies or save state into storage.

24
Q

De-serialized object

A

Is the reverse process where the byte stream recreates the actual object in memory.

25
Q

Non-Primitive Data types

A

Strings, arrays, user defined classes. Created by programmer and is not defined in language.

26
Q

Anomaly-based detection

A

Prescribes the baseline for expected patterns based on its observation of what normal looks like.

If large sums of money are spent one after another in one day and it is not your typical behavior, a bank can block your card.

27
Q

Trend-Analysis

A

Not used for detection, but instead to better understand capacity and the system’s normal baseline.

28
Q

Heuristic-Analysis

A

Determines whether several observed data points constitute an indicator and whether related indicators make up an incident depending on a good understanding of the relationship between the observed indicators. Method of detecting viruses by examining code for suspicious properties. Malware-like behavior patterns.

Heuristic-Analysis example: scans potential malware to find suspicious properties like junk-code or use of uncommon API’s. Sometimes uses signature based detection

29
Q

Behavior-based detection

A

(Statistical or profile-based detection) means that the engine is trained to recognize baseline traffic or expected events associated with a user account or network device. Anything that deviates from the baseline (outside a level of tolerance) generates an alert. Records expected patterns concerning the entity being monitored like user logins.

Examines results of something happening or potentially happening. Views results of a program for susicious activity. Disabling anti-virus, installing rootkits, deleting altering or adding system files. Might execute malware in sandbox environment before it can actually execute the behavior.