Unit 3 Vocabulary Flashcards
home directory
every user has a “home directory” that bears their username. This is similar in concept to My Documents folder in Windows. (Linux default: /home/username/)
Flags
(to Linux commands) - options to modify command behaviors
Access Control
The selective process of allowing or restricting the availability of a recourse.
Owner
The user that owns the file
Group
A collection of users who have access to the file
Other/World
Everyone else
Read (r)
Read a file or look inside a directory, matrix # - 4
Write (w)
Write or modify a file or modify a directory’s contents matrix # - 2
Execute (e)
Execute or run a file, or go into a directory (using, for example, cd) matrix # - 1
Permission Matrix (drwxrwxrwx)
d = directory or file, 1st rwx = owner permissions, 2nd rwx = group permissions, 3rd rwx = others permissions
.sh
A script that executes commands when ran
Hidden files in Linux (begin with a .)
Hidden files don’t show up for the first ls command, only for ls -a or ls -la (ex: /.hideme)
Open source
Software that is freely available to anyone who wants to use it. Users can modify it and distribute it however they want
GNU Privacy Guard (gpg)
A command-line tool that lets you encrypt files with a variety of encryption algorithms
Shell
A program that allows a user to enter commands to interact with an operating system
Spawned
The act of starting or launching a process. The new process is a child process of a parent process; in other words, a parent process “spawns” a child process.
Background Process
A process in UNIX that runs without user input
Root Directory
In UNIX, the top-most directory denoted as /
Open Systems Interconnection (OSI) model
A collection of many network protocols. It uses abstraction at different levels of detail to define how network components see, interpret, and process network traffic.
Layers 1-7 (lowest first) acronym: Please Do Not Teach Students Pointless Acronyms
Layers 1-7 (lowest first): Physical, Data Link, Network, Transport, Session, Presentation, Application
Security Baseline
A starting point for data analysis. It is the initial data set used in later comparisons
Subnet
A smaller part of a larger network
Reconnaissance
The first phase of ethical hacking, which involves probing the network to understand its structure and to see what services are open and running
Scanning
The second phase of ethical hacking, which involves taking a closer look at the services and software running on the host
Compromise
The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.