.04 RG Vocab system security - linux Flashcards

1
Q

Source code

A

Programming code in text format compiled into software you can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GNU

A

Not UNIX; recognized as the start of the Open-Source Movement in 1983. GNU
software is included with the Linux kernel in the form of distribution or distros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Linux

A

Operating system kernel released in 1991 named after Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open source

A

Describes software that allows the end user to have access to the source
code and the freedom to change and implement that software based on a less restrictive
license than closed-source software. Examples: GNU Core Utilities, Linux, FreeBSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Closed source

A

Describes software that gives the end user little to no access to the source
code and limited freedom to change and implement that software based on a very restrictive
license compared to open-source licenses. Examples: Microsoft, UNIX, IBM z/OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux kernel

A

A foundational Linux component responsible for the low-level interface
between an operating system and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bootloader

A

Code run by a computer after it starts. The bootloader can then be pointed to
the Linux kernel on storage/disk to start the Linux kernel (i.e., bootstrapping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Drivers

A

Software that makes computer devices available for use by applications. File system
drivers “present” the filesystem to applications that save files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network

A

Allows applications to communicate from a computer to other computers over
wired (Ethernet) and wireless networks (IEEE 802.11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux Security Modules (LSM)

A

Primarily designed as enhanced access control
mechanisms called mandatory access control (MAC); includes AppArmor, SELinux, Smack,
and TOMOYO. Do not confuse this MAC with the layer 2 media access control addresses in
Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Processes, instances, and threads

A

Hardware resources and “time” to run (i.e., an
instance) allocated by an operating system when code is run. This process can perform
multiple activities, which are known as threads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sessions

A

Consists of a group of processes. When users log in, applications and services
(known as daemons) are instantiated and grouped into process groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tty, pty

A

Teletype and pseudo-teletype; terminal types used for interactive CLI and GUI
applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Service (daemon)

A

A process that involves no interaction with a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applications

A

Any process that the user can interact with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password

A

A series of characters known by a user and used in conjunction with user
accounts to assure a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Login prompt

A

Triggers applications and services (daemons) to instantiate and group into
process groups when a user logs in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Command-line interface (CLI)

A

A user interface that allows for typing commands within a
Linux system; starts on bootup or launches from the graphical user interface (GUI) via the
terminal emulator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Graphical user interface (GUI)

A

A user interface that provides interaction with a windowed
environment to launch applications with a pointing device (e.g., a mouse); generally starts on
bootup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

GNU Core Utilities (coreutils)

A

A foundational Linux component that provides common
commands integrated with the command-line interface (CLI). The coreutils package contains
many common commands that include but are not limited to ls, mv, cp, touch, cat, and pwd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

X server

A

A foundational Linux distro component that provides a graphical user interface
(GUI)

22
Q

Package management

A

A foundational component that provides software and service
installation, updates, and removal

23
Q

Client

A

Requests resources or services from a server

24
Q

Server

A

Provides resources or services for a client

25
Protocols
Used by computer systems to agree on how to communicate with one another over a network
26
Vulnerabilities
Weakness in software or a system
27
Threats
Actor that seeks to exploit vulnerabilities
28
Exploits
An action taken by an actor to compromise a system by using vulnerabilities
29
Ransomware
Malware used to deprive organizations of access to their information until they pay a ransom
30
Bot
A system infected by malware that allows for remote command and control (C&C) of the infected systems
31
C&C
Command and control or C2; refers to systems that control already infected systems (bots) to launch various attacks (e.g., a DDoS or a coin-mining operation)
32
Worms
Malware that propagates by detecting other systems on a network with specific vulnerabilities and then by replicating its code on the system to exploit those vulnerabilities
33
Shellshock
A vulnerability that existed for 30 years before being noticed in 2014; remains an enterprise threat. Shellshock exploits a BASH vulnerability to provide an attacker with elevated privileges that they would not have otherwise.
34
Distributed Denial of Service (DDoS)
An attack that uses C&C and bots to send traffic to systems that overwhelm those systems
35
Kali Linux
A popular Linux distro that includes many useful security tools
36
hashcat
An advanced password recovery utility that can determine the strength of passwords based on the amount of time it takes to crack the password
37
Endpoint security
Security controls installed on endpoint systems, such as computers
38
ClamAV
A toolkit and malware detection engine that can quickly scan files
39
Firewall
A system or device that has configurable rules that protect systems from other hosts on the network
40
iptables
A firewall software package for Linux systems
41
DDoS mitigation
The people, processes, and technology involved in thwarting a DDoS attack
42
Hardening
An all-encompassing term that describes tools, controls, and processes used to increase infrastructure security
43
User configuration
Proper password rules and user setup, which are critical to server security and required in modern server software
44
Business requirements
The processes, assets, people, and practices that are necessary for a business to operate and that must be considered when assessing security updates
45
“Over hardening”
Occurs when the application of security controls impacts the ability of users to work on a system (i.e., availability is impacted)
46
“Under hardening”
Occurs when there are insufficient security controls in place to address risks identified in the risk management process
47
Access control
A security control that endeavors to limit access to individuals who need permission to obtain specific information
48
Baselining
A standard set of security configurations applied to a set of similar systems in an organization
49
Security controls
Any administrative, technological, or physical controls used to implement proper security
50
Host firewall
A generic term for a firewall installed on a host system. Example: iptables/nftables
51
Patching
Software updates that remediate security vulnerabilities
52
Center for Internet Security (CIS) Benchmarks
Industry practice security configurations. Three profiles are available: Level 1, Level 2, and STIG. Each profile addresses specific organizational and system risks that find the right hardening balance.