Acronyms 2 Flashcards

(602 cards)

1
Q

Control Plane

A

used to achieve zero trust
includes adaptive identity, threat scope reduction and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Plane

A

subject/system, policy engine, policy admin, and enforcement point
ensures policies are properly executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

anything that could cause harm, loss damage or compromise to our info tech systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

any weakness in system design
- Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

reasons for it
-maintain a business advantage
- achieve compliance
- protect personal privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ways to ensure confidentiality

A

data masking, physical security, training, encryption and access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individuals

Hashing
checksums
digital signatures
access controls
regular audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability

A

Ensure that information, systems, and resources are accessible and operational
when needed by authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

authentication

A

Security measure that ensures individuals or entities are who they claim to be
during a communication or transactio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Syslog Server

A

used to achiev accounting
it aggregates logs from various network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIEM

A

Security Information and Event Management Systems

Provides us with a real-time analysis of security alerts generated by
various hardware and software infrastructure in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technical Controls

A

Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Managerial Controls

A

Sometimes also referred to as administrative controls
● Involve the strategic planning and governance side of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operational controls

A

Procedures and measures that are designed to protect data on a
day-to-day basis
● Are mainly governed by internal processes and human actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Preventative Controls

A

Proactive measures implemented to thwart potential security threats or
breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Deterrent Controls

A

Discourage potential attackers by making the effort seem less appealing or more challenging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Detective Control

A

Monitor and alert organizations to malicious activities as they occur or

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Corrective Controls

A

Mitigate any potential damage and restore our systems to their normal state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Compensating Controls

A

Alternative measures that are implemented when primary security controls are not feasible or effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Directive Controls

A

Guide, inform, or mandate actions
● Often rooted in policy or documentation and set the standards for
behavior within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Gap Analysis

A

Process of evaluating the differences between an organization’s current
performance and its desired performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Technical Gap Analysis

A

infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Business Gap Analysis
26
POA&M
plan of action and milestones used in gap analysis Outlines the specific measures to address each vulnerability ● Allocate resources ● Set up timelines for each remediation task that is neede
27
Zero Trust
demands verification for every device, user, and transaction within the network, regardless of its origin
28
Adaptive Identity
Relies on real-time validation that takes into account the user's behavior, device, location, and more
29
Threat Scope Reduction
Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
30
Policy Driven Access Control
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
31
Secured Zones
Isolated environments within a network that are designed to house sensitive data
32
Policy Engine
Cross-references the access request with its predefined policies
33
Policy Admin
Used to establish and manage the access policies
34
Policy Enforcement Point
Where the decision to grant or deny access is actually execute
35
Unskilled Attackers
Limited technical expertise, use readily available tools
36
Hacktavist
Driven by political, social, or environmental ideologies
37
Organized Crime
Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
38
Nation State Actor
Highly skilled attackers sponsored by governments for cyber espionage or warfare
39
Insider Threat
Security threats originating from within the organization
40
Shadow IT
IT systems, devices, software, or services managed without explicit organizational approval
41
Honeypot
Decoy systems to attract and deceive attackers
42
Honeynet
Network of decoy systems for observing complex attacks
43
Honeyfiles
Decoy files to detect unauthorized access or data breaches
44
Honeytoken
Fake data to alert administrators when accessed or used
45
Threat Actor Intent
Specific objective or goal that a threat actor is aiming to achieve through their attack-
46
Threat Actor Motivation
underlying reasons or driving forces that push threat actor to carry out attack
47
data exfiltration
Unauthorized transfer of data from a computer
48
Espionage
Spying on individuals, organizations, or nations to gather sensitive or classified information
49
Script Kiddie
Individual with limited technical knowledge
50
Nation State Actor
Groups or individuals that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals
51
False Flag Attack
Attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else
52
APT
Advanced Persistent Threat Term that used to be used synonymously with a nation-state actor because of their long-term persistence and stealth -A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage
53
Insider Threat
Cybersecurity threats that originate from within the organization
54
Threat Vector
Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action - the "how" of the attack Ex. Message based threat vector
55
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment -the "where" of the attack
56
Baiting
Leaving a malware-infected USB drive in a location where a target may find it
57
BlueBorne
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction
58
BlueSmack
Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device
59
TTPs
Tactics techniques and procedures of how a threat actor operates
60
Deception and Disruption Technologies
honeypots, bogus DNS entries, etc
61
Dynamic Page Generation purpose
Effective against automated scraping tools or bots trying to index or steal content from your organization's website
62
Port Triggering
Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
63
purpose of spoofing fake telemetry data
When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data
64
Bollard
Robust, short vertical posts, typically made of steel or concrete, that are designed to manage or redirect vehicular traffic
65
Brute Force
Type of attack where access to a system is gained by simply trying all of the possibilities until you break through
66
Surveillance System
Organized strategy or setup designed to observe and report activities in a given area. Can be as simple as a security guard.
67
PTZ System
Pan-Tilt-Zoom (PTZ) System
68
Infrared Sensors
Detect changes in infrared radiation that is often emitted by warm bodies like humans or animal
69
Microwave Sensor
Detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects
70
Ultrasonic Sensors
Measures the reflection of ultrasonic waves off moving objects
71
EMI
Electromagnetic Interference Involves jamming the signals that surveillance system relies on to monitor the environment
72
Access Control Vestibule
Double-door system that is designed with two doors that are electronically controlled to ensure that only one door can be open at a given time
73
Piggybacking
Involves two people working together with one person who has legitimate access intentionally allows another person who doesn't have proper authorization to enter a secure area with them
74
Tailgating
Occurs whenever an unauthorized person closely follows someone through the access control vestibule who has legitimate access into the secure space without their knowledge or consent
75
NFC and RFID
RFID (Radio-Frequency Identification) ● NFC (Near-field Communication)
76
FAR
false acceptance rate
77
FRR
false rejection rate
78
CER
cross over error rate
79
Cipher Lock
■ Mechanical locks with numbered push buttons, requiring a correct combination to open ■ Commonly used in high-security areas like server rooms
80
Social Engineering
Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces
81
Impersonation
Pretending to be someone else
82
Pretexting
Creating a fabricated scenario to manipulate targets
83
Social Proof- Social engineering strategy
Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations
84
Brand Impersonation
pretending to be Kohls on twitter
85
Typosquatting
Also known as URL hijacking or cybersquatting Form of cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors
86
Watering hole attack
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
87
Phishing
Sending fraudulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers
88
Spear Phishing
More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations ● Has a higher success rate
89
Whaling
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
90
BEC
Business email compromise Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacke
91
Vishing
voice phishing
92
Smishing
SMS phishing
93
Anti-phishing campaign
part of security awareness training
94
Fraud
Wrongful or criminal deception that is intended to result in financial or personal gain for the attacker
95
Identity Fraud
using someone else's cc #
96
Identity Theaft
fully impersonating someone else
97
Scams
fraudulent or deceptive act or operation
98
Invoice Scam
In which a person is tricked into paying for a fake invoice for a product or service that they did not actually order
99
Influence campaign
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group
100
Misinformation
False or inaccurate information shared without harmful intent
101
Disinformation
Involves the deliberate creation and sharing of false information with the intent to deceive or mislead
102
Diversion Theft
Involves manipulating a situation or creating a distraction to steal valuable items or information
103
Hoax
Malicious deception that is often spread through social media, email, or other communication channels ● Often paired with phishing attacks and impersonation attacks
104
Dumpster Diving
involves searching through trash to find valuable information ● Commonly used to find discarded documents containing personal or corporate information ● Use clean desk and clean desktop policie
105
Malware
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
106
Types of malware
Viruses ■ Worms ■ Trojans ■ Ransomware ■ Spyware ■ Rootkits ■ Spam
107
Viruses
Made up of malicious code that's run on a machine without the user's knowledge and this allows the code to infect the computer whenever it has been run
108
Worms
standalone programs replicating and spreading to other computers without any user interaction
109
Trojans
Disguise as legitimate software, grant unauthorized access
110
Ransomeware
Encrypts user data, demands ransom for decryption
111
Boot sector virus
One that is stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up
112
Macro Virus
Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed
113
Program Virus
Try to find executables or application files to infect with their malicious code
114
Multipartite Virus
Combination of a boot sector type virus and a program virus
115
Encrypted Virus
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
116
Polymorphic Virus
Advanced version of an encrypted virus, but instead of just encrypting the contents it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection
117
Metamorphic Virus
Able to rewrite themselves entirely before it attempts to infect a given file
118
Stealth Virus
Technique used to prevent the virus from being detected by the anti-virus software
119
Armored Virus
Have a layer of protection to confuse a program or a person who's trying to analyze it
120
RAT
Remote access trojan Widely used by modern attackers because it provides the attacker with remote control of a victim machine
121
Botnet
Network of compromised computers or devices controlled remotely by malicious actor
122
Zombie
Name of a compromised computer or device that is part of a botnet
123
Command and control node
Computer responsible for managing and coordinating the activities of other nodes or devices within a network
124
DDoS
Occurs when many machines target a single victim and attack them at the exact same time
125
Rootkit
Designed to gain administrative level control over a given computer system without being detected
126
Ring 3
outermost ring where user level permissions are used
127
Ring 0
highest permission levels
128
Kernel Mode
located in ring 0 Allows a system to control access to things like device drivers, your sound card, your video display or monitor, and other similar things
129
DLL
dynamic link library Collection of code and data that can be used by multiple programs simultaneously
130
DLL Injection
Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic-link library
131
Shim
Piece of software code that is placed between two components and that intercepts the calls between those components and can be used redirect them
132
Backdoor
Originally placed in computer programs to bypass the normal security and authentication functions Remote Access Trojan (RAT) acts just like a backdoor in our modern networks
133
Easter Egg
a hidden feature or novelty within a program that is typically inserted by the software developers as an inside joke
134
Logic Bomb
Malicious code that's inserted into a program, and the malicious code will only execute when certain conditions have been met
135
Keylogger
Piece of software or hardware that records every single keystroke that is made on a computer or mobile device can be software or hardware keylogger
136
Spyware
Malicious software that is designed to gather and send information about a user or organization without their knowledge
137
Bloatware
Any software that comes pre-installed on a new computer or smartphone that you, as the user, did not specifically request, want, or need
138
Malware Exploitation Technique
Specific method by which malware code penetrates and infects a targeted system
139
Fileless Malware
is used to create a process in the system memory without relying on the local file system of the infected hos
140
Fileless Malware Stage 1 Dropper or Downloader
Dropper - Specific malware type designed to initiate or run other malware forms within a payload on an infected host Downloader - Retrieve additional tools post the initial infection facilitated by a dropper
141
Shellcode
Broader term that encompasses lightweight code meant to execute an exploit on a given targe
142
Actions on Objectives Phase
Threat actors will execute primary objectives to meet core objectives like ■ data exfiltration ■ file encryption
143
concealment
hiding tracks ■ erasing log files ■ hiding any evidence of malicious activity
144
Living off the Land
A strategy adopted by many Advanced Persistent Threats and criminal organizations ■ the threat actors try to exploit the standard tools to perform intrusions
145
Impossible Travel
Refers to a scenario where a user's account is accessed from two or more geographically separated locations in an impossibly short period of time
146
Data Protection
Safeguarding information from corruption, compromise, or loss
147
Data Sovereignty
Information subject to laws and governance structures within the nation it is collected
148
DLP
data loss prevention
149
Data Classification
Based on the value to the organization and the sensitivity of the information, determined by the data owner
150
Sensitive Data
Information that, if accessed by unauthorized persons, can result in the loss of security or competitive advantage for a company
151
Commerical Public Data
No impact if released; often publicly accessible data
152
Commerical Sensitive Data
Minimal impact if released, e.g., financial data
153
Commerical Private Data
Contains internal personnel or salary information
154
Commerical Confidential Data
Holds trade secrets, intellectual property, source code, etc.
155
Commerical Critical Data
Extremely valuable and restricted information
156
Government Unclassified Data
Generally releasable to the public
157
Government Sensitive but unclassified data
Includes medical records, personnel files, etc.
158
Government confidential data
Contains information that could affect the government
159
Government Secret data
Holds data like military deployment plans, defensive postures
160
Government top secret data
Highest level, includes highly sensitive national security information
161
Data Ownership
Process of identifying the individual responsible for maintaining the confidentiality, integrity, availability, and privacy of information assets
162
Data Owner
A senior executive responsible for labeling information assets and ensuring they are protected with appropriate controls
163
Data Controller
Entity responsible for determining data storage, collection, and usage purposes and methods, as well as ensuring the legality of these processes
164
Data Processor
A group or individual hired by the data controller to assist with tasks like data collection and processing
165
Data Steward
Focuses on data quality and metadata, ensuring data is appropriately labeled and classified, often working under the data owner
166
Data Custodian
Responsible for managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures
167
Privacy Officer
Oversees privacy-related data, such as personally identifiable information (PII), sensitive personal information (SPI), or protected health information (PHI), ensuring compliance with legal and regulatory frameworks
168
Data at Rest
Data stored in databases, file systems, or storage systems, not actively moving
169
FDE
full disk encryption
170
Data in Transit
Data actively moving from one location to another, vulnerable to interception
171
SSL and TLS
Secure Sockets layer and Transport layer security. It secures and encrypts communciaion over networks
172
VPN
virtual private network Creates secure connections over less secure networks like the internet
173
IPSec
Secures IP communications by authenticating and encrypting IP packets
174
Data in use
Data actively being created, retrieved, updated, or deleted
175
Regulated Data
Controlled by laws, regulations, or industry standards GDPR, HIPPA
176
PII
Personal Identification Information
177
PHI
Protected Health Information
178
Trade Secrets
Confidential business information giving a competitive edge (e.g., manufacturing processes, marketing strategies, proprietary software)
179
IP
intellectual property Creations of the mind (e.g., inventions, literary works, designs)
180
Human readable data
Understandable directly by humans (e.g., text documents, spreadsheets)
181
Non human readable data
Requires machine or software to interpret (e.g., binary code, machine language) contains sensitive information that
182
Data Sovereignty
■ Digital information subject to laws of the country where it's located ■ Gained importance with cloud computing's global data storage
183
GDPR (General Data Protection Regulation)
Protects EU citizens' data within EU and EEA borders ■ Compliance required regardless of data location ■ Non-compliance leads to significant fines
184
Geofencing
Virtual boundaries to restrict data access based on location
185
Hashing
■ Converts data into fixed-size hash values ■ Irreversible one-way function ■ Commonly used for password storage
186
Tokenization
Replace sensitive data with non-sensitive tokens. Original data stored securely in a separate database. Often used in payment processing for credit card protection
187
Obfuscation
Make data unclear or unintelligible
188
Segmentation
Divide network into separate segments with unique security controls
189
DLP
Data loss prevention Aims to monitor data in use, in transit, or at rest to detect and prevent data theft can be hardware or software
190
Types of DLP systems
endpoint DLP (installed on laptops) Network DLP Storage DLP Cloud based DLP
191
Risk Identification
Proactive process recognizing potential risks
192
Risk Analysis
Evaluate likelihood and potential impact Qualitative or quantitative methods
193
Risk Monitoring
Monitor residual risks, identify new risks, and review risk management effectiveness
194
Risk Reporting
Communicate risk information and effectiveness of risk management to stakeholders ● Various forms ○ Dashboards ○ Heat Maps ○ Detailed Reports
195
Qualitative Risk Analysis
Assess and prioritize risks based on likelihood and impact
196
Quantitative Risk Analysis
Numerically estimate probability and potential impact
197
Ad hoc risk assessment
Conducted as needed, often in response to specific events or situations
198
One time risk assessment
Conducted for specific projects or initiatives
199
BIA
Business Impact Analysis Evaluates effects of disruptions on business functions Identifies and prioritizes critical functions Determines required recovery time for functions
200
RTO
recovery time objective Maximum acceptable time before severe impact
201
RPO
Recovery point objective Maximum acceptable data loss measured in time
202
MTTR
mean time to repair
203
MTBF
mean time between failures
204
Risk Reigster
Records identified risks, descriptions, impacts, likelihoods, and mitigation actions
205
Risk Impact
Low medium or high
206
Risk liklihood
probability of risk occurrence rated on a scale numerical or descriptive
207
Risk outcome
result if it occurs
208
Risk level or threshold
Determined by combining the impact and likelihood Prioritizes risks (e.g., high, medium, low)
209
Risk Tolerance/Risk acceptance
An organization or individual’s willingness to deal with uncertainty in pursuit of their goals ● Maximum amount of risk they are willing to accept ● Acceptance without countermeasures
210
Risk Appetite
Willingness to pursue or retain risk expansionary, conservative etc
211
KRIs
key risk indicators
212
Risk Owner
Responsible for managing the risk Monitors, implements mitigation actions, and updates Risk Register
213
EF
exposure factor Proportion of asset lost in an event (0% to 100%)
214
SLE
single loss expectancy Monetary value expected to be lost in a single event Asset value x EF
215
ARO
annualized rate of occurence
216
ALE
Annualized Loss Expectancy (ALE)) SLE x ARO
217
Risk transference
Shifts risk to another party Common methods ○ Insurance ○ Contract indemnity clauses
218
Contract Indemnity Clause
■ A contractual agreement where one party agrees to cover the other’s harm, liability, or loss stemming from the contract
219
Risk Acceptance
Acknowledge and deal with risk if it occurs
220
Exemption
(excludes party from a rule
221
Exception
(allows party to avoid rule under specific conditions)
222
Risk Avoidance
Change plans or strategies to eliminate a specific risk
223
Risk Mitigation
Take steps to reduce likelihood or impact of risk ● Common strategy involving various actions
224
Residual Monitoring
The likelihood and impact of the risk after mitigation, transference, or acceptance measures have been taken on the initial risk
225
Control Risk
Assessment of how a security measure has lost effectiveness over time
226
Risk reporting
Communicating information about risk management activities to stakeholders
227
Third Party Vendor Risks
Potential security and operational challenges from external collaborators
228
MSP
managed service provider Manage IT services on behalf of organizations
229
CHIPS Act of 2022
U.S. federal statute providing funding to boost semiconductor research and manufacturing in the U.S. ■ Aims to reduce reliance on foreign-made semiconductors, strengthen the domestic supply chain, and enhance security
230
Semiconductor
Essential components in a wide range of products, from smartphones and cars to medical devices and defense systems
231
Vendor Assessment
■ Process to evaluate the security, reliability, and performance of external entities ■ Crucial due to interconnectivity and potential impact on multiple businesses
232
Vendors
provide goods or services
233
Suppliers
Involved in production and delivery of products or parts
234
Penetration Testing
Simulated cyberattacks to identify vulnerabilities in supplier systems
235
Right to Audit Clause
Contract provision allowing organizations to evaluate vendor's internal processes for compliance
236
Due dilligence
A rigorous evaluation that goes beyond surface-level credentials ● Includes the following ○ Evaluating financial stability ○ Operational history ○ Client testimonials ○ On-the-ground practices to ensure cultural alignmen
237
Vendor Questionnaires
Comprehensive documents filled out by potential vendors
238
Rules of Engagement
Guidelines for interaction between organization and vendors
239
Vendor Monitoring
Mechanism used to ensure that the chosen vendor still aligns with organizational needs and standards
240
Feedback Loops
Involve a two-way communication channel where both the organization and the vendor share feedback
241
Basic Contract
● Versatile tool that formally establishes a relationship between two parties ● Defines roles, responsibilities, and consequences for non-compliance ● Specifies terms like payment structure, delivery timelines, and product specifications
242
SLA
Defines the standard of service a client can expect from a provider ● Includes performance benchmarks and penalties for deviations Service level agreement
243
MOA
Memorandum of Agreement Formal, outlines specific responsibilities and roles
244
MOU
Memorandum of Understanding Less binding, expresses mutual intent without detailed specifics
245
MSA
master serivce agreement ● Covers general terms of engagement across multiple transactions ● Used for recurring client relationships, supplemented by Statements of Work
246
SOW
statement of work Specifies project details, deliverables, timelines, and milestones
247
NDA
Non-Disclosure Agreement
248
BPA or JV
Business Partnership Agreement or joint venture agreement ● Goes beyond basic contracts when two entities collaborate ● Outlines partnership nature, profit-sharing, decision-making, and exit strategies
249
Governance
Overall management of IT infrastructure, policies, procedures, and operations Risk management strategic alingment resource management performance management
250
Compliance
Adherence to laws, regulations, standards, and policies
251
GRC
governance risk and compliance
252
Boards
elected by shareholders to oversee an orgs management
253
Commitees
subgroups of board with specific focuses
254
Centralized governance
Decision-making authority at top management levels
255
Decentralized governance
Decision-making authority distributed throughout the organization
256
AUP
Acceptable use policy Document that outlines the do's and don'ts for users when interacting with an organization's IT systems and resources
257
Incident Response Policy
Specifies incident notification, containment, investigation, and prevention steps
258
SDLC Policy
software development lifecycle Guides software development stages from requirements to maintenance Includes secure coding practices, code reviews, and testing standards
259
Change Management Policy
Governs handling of IT system/process changes
260
Standards
Provides a framework for implementing security measures, ensuring that all aspects of an organization's security posture are addressed
261
Password Standards
■ Define password complexity and management ■ Include length, character types, regular changes, and password reuse rules ■ Emphasize password hashing and salting for security
262
Access Control Standards
■ Determine who has access to resources within an organization ■ Include access control models like ● Discretionary Access Control (DAC) ● Mandatory Access Control (MAC) ● Role Based Access Control (RBAC)
263
Encryption Standards
■ Ensure data remains secure and unreadable even if accessed without authorization ■ Include encryption algorithms like AES, RSA, and SHA-2 ■ Depends on the use case and balance between security and performanc
264
Procedures
■ Systematic sequences of actions or steps taken to achieve a specific outcome in an organization ■ Ensures consistency, efficiency, and compliance with standard
265
Playbook
■ Detailed guides for specific tasks or processes ■ They provide step-by-step instructions for consistent and efficient execution ■ Used in various situations, from cybersecurity incidents to customer complaints ■ Include resource requirements, steps to be taken, and expected outcomes
266
compliance reporting
Systematic process of collecting and presenting data to demonstrate adherence external or internal
267
Compliance Monitoring
Regularly reviews and analyzes operations for compIiance includes due diligence and due care, attestation and acknowledgement, and internal and external monitoringliance
268
Due Diligence
Identifying compliance risks through thorough review
269
Due Care
Mitigating identified risks
270
Assest Management
Systematic process of developing, operating, maintaining, and selling assets cost-effectively
271
Acquisition
Process of obtaining goods and services
272
Procurement
Entire process of sourcing and obtaining those goods and services, including all the processes that lead up to the acquisition
273
Purchase Order
Formal document issued by the purchasing department For larger, more expensive purchases Dictates payment terms (NET 15, NET 30, NET 60)
274
BYOD
bring your own device Employees use personal devices for work
275
COPE
The company provides devices for employees
276
CYOD
Employees select devices from a company-approved list Balance between employee choice and organizational control
277
Assest Monitoring
Maintaining an inventory with specifications, location, and assigned users
278
Asset Tracking
Goes beyond monitoring, involving the location, status, and condition of assets using specialized software and tracking technologie
279
MDM
mobile device management
280
Asset Disposal and Decommissioning
Necessity to manage the disposal of outdated assets
281
NIST Special Publication 800-88 (Guidelines for Media Sanitization)
Provides guidance on asset disposal and decommissioning
282
Sanitization
Thorough process to make data inaccessible and irretrievable from storage medium using traditional forensic method
283
Overwriting
Replacing the existing data on a storage device with random bits of information to ensure that the original data is obscured
284
Deguassing
Utilizes a machine called a degausser to produce a strong magnetic field that can disrupt magnetic domains on storage devices like hard drives or tapes
285
Secure Erase
Deletes data and ensures it can't be recovered
286
CE
cryptographic erase Utilizes encryption technologies for data sanitization
287
Destruction
Goes beyond sanitization, ensures physical device is unusable Used for high-security environments, especially with Secret or Top Secret data ■ Recommended methods ● Shredding ● Pulverizing ● Melting ● Incineratin
288
Certification
Acts as proof that data or hardware has been securely disposed of ■ Important for organizations with regulatory requirements ■ Creates an audit log of sanitization, disposal, or destruction
289
Data Retention
Strategically deciding what to keep and for how long
290
CAB
change advisory board
291
Change OWner
Individual or team responsible for initiating change request
292
Impact Analysis
Integral part of the Change Management process Assesses potential fallout, immediate effects, long-term impacts
293
Scheduled Maintenance Window
Designated timeframes for implementing changes
294
Backout Plan
Pre-determined strategy to revert systems to their original state in case of issues during change implementation
295
SOPs
standard operating procedure Detailed step-by-step instructions for specific tasks ● Ensures consistency, efficiency, and reduces errors in change implementation within the organization has to do with change management
296
Allow List
Specifies entities permitted to access a resource
297
Downtime
Any change, even minor, carries the risk of causing downtime
298
Restricted Activities
Certain tasks labeled as 'restricted' due to their impact on system health or security
299
Version control
Tracks and manages changes in documents, software, and other files Allows multiple users to collaborate and revert to previous versions when needed
300
Audits
Systematic evaluations of an organization's information systems, applications, and security controls
301
Assessment
Detailed analysis to identify vulnerabilities and risks Performed before implementing new systems or significant changes risk vulnerability or threat assessments
302
Reconnaissance in Pentesting
Gathering information before a pentest can be pasive or active
303
Audit committee
A group, often comprising members of a company's board of directors, overseeing audit and compliance activities
304
Threat Modeling Exercise
Identifies potential threats to applications (e.g., SQL injection, XSS, DoS attacks)
305
MCIT Cybersecurity Self-Assessment
is designed to help organizations minimize data and cybersecurity-related exposures ● It assists in identifying areas where data security may need strengthening ● The checklist comprises yes-or-no questions with sections for comments and action items
306
Examination
Detailed inspections of an organization's security infrastructure conducted externally
307
Red teaming
offensive pen testing
308
Blue teaming
defensive
309
integrated pen testing
purple teaming
310
Reconnaissance
Initial phase where an attacker gathers information about the target system
311
Active Reconnaissance
Engaging with the target system directly, such as scanning for open ports using tools like Nmap
312
Passive Reconnaissance
Gathering information without direct engagement, like using open-source intelligence or WHOIS to collect data
313
Metasploit
Multipurpose computer security and penetration testing framework
314
Attestation
Involves formal validation or confirmation provided by an entity to assert the
315
Cyber resilience
Ability to deliver outcomes despite adverse cyber events
316
Redundancy
Having additional systems or processes for continued functionality
317
Uptime
The time a system remains online, typically expressed as a percentage
318
Five Nines
Refers to 99.999% uptime, allowing only about 5 minutes of downtime per year
319
Load Balancing
Distributes workloads across multiple resources
320
Clustering
Uses multiple computers, storage devices, and network connections as a single system
321
Multi Cloud Approach
Distributes data, applications, and services across multiple cloud providers Mitigates the risk of a single point of failure
322
RAID
helps with data redundancy Combines multiple physical storage devices into a single logical storage device recognized by the operating system
323
RAID Category Failure Resistent
resists hardware malfunctions through redundancy RAID 1
324
RAID Category Fault Tolerant
Allows continued operation and quick data rebuild in case of failure (e.g., RAID 1, RAID 5, RAID 6, RAID 10
325
RAID Category Disaster tolerant
Safeguards against catastrophic events by maintaining data in independent zones (e.g., RAID 1, RAID 10)
326
Capacity Planning
People, technology, infrastructure and processes
327
Surge
Sudden, small increases in voltage beyond the standard level (e.g., 120V in the US)
328
Spike
Short-lived voltage increases, often caused by short circuits, tripped breakers, or lightning
329
Sags
Brief decreases in voltage, usually not severe enough to cause system shutdown
330
Undervoltage Events Brownouts
Prolonged reduction in voltage, leading to system shutdown
331
Power Loss Events Blackouts
Complete loss of power for a period, potentially causing data loss and damage
332
Line Conditioner
Stabilize voltage supply and filter out fluctuations Stabilize voltage supply and filter out fluctuations
333
UPS
Uninterruptible Power Supplies (
334
Generator
Convert mechanical energy into electrical energy for use in an external circuit through the process of electromagnetic inductio
335
PDC
Power Distribution Centers Central hub for power reception and distribution Integrates with UPS and backup generators for seamless transitions during power events
336
Onsite backups
Storing data copies in the same location as the original data
337
Offsite Backup
Storing data copies in a geographically separate location
338
Snapshots
Point-in-time copies capturing a consistent state
339
Replication
Real-time or near-real-time data copying to maintain data continuity
340
Journaling
Maintaining a detailed record of data changes over time
341
COOP
Continuity of Operations Plan
342
BC Plan
Business Continuity Planning
343
DRP
Disaster Recovery Plan subset of BC plan
344
Redundant Site
Backup location or facility that can take over essential functions and operations in case the primary site experiences a failure or disruption
345
Hot Site
Up and running continuously, enabling a quick switchover Requires duplicating all infrastructure and data
346
Warm site
Not fully equipped, but fundamentals in place
347
Cold Site
Fewer facilities than warm sites May be just an empty building, ready in 1-2 months
348
Virtual hot site
Fully replicated and instantly accessible in the cloud
349
Virtual Warm Site
Involves scaling up resources when needed
350
Resilience Testing
Assess system's ability to withstand and adapt to disruptive events -Conducted through tabletop exercises, failover tests, simulations, and parallel processing
351
Recovery Testing
Evaluates the system's capacity to restore normal operation after a disruptive event
352
TTX
Table Top Exercise Scenario-based discussion among key stakeholders
353
Failover Test
Controlled experiment for transitioning from primary to backup components
354
Simulation
Computer-generated representation of a real-world scenario Allows for hands-on response actions in a virtual environment
355
Parallel Processing
Replicates data and system processes onto a secondary system
356
Responsibility Matrix
Outlines the division of responsibilities between the cloud service provider and the customer
357
Hybrid Solutions
Combined on-premise, private cloud, and public cloud services, allowing workload flexibility
358
Lack of Up-to-date Security Measures
Cloud environments are dynamic and require up-to-date security measures
359
Single Point of Failure
Cloud services relying on specific resources or processes can lead to system-wide outages if they fail
360
Data Remnants
Residual data left behind after deletion or erasure processes
361
Virtualization
Emulates servers, each with its own OS within a virtual machine
362
Contanerization
Lightweight alternative, encapsulating apps with their OS environment
363
Hypervisor Type 1
bare metal
364
Type 2 Hypervisor
Operates within a standard OS (e.g., VirtualBox, VMware)
365
VM Escape
Attackers break out of isolated VMs to access the hypervisor
366
Privilege Escalation
Unauthorized elevation to higher-level users
367
Live VM Migration
Attacker captures unencrypted data between servers
368
Resource Reuse
Improper clearing of resources may expose sensitive data
369
Serverless
Relies on cloud service providers to handle server management, databases, and some application logic
370
FaaS
Developers write and deploy individual functions triggered by events
371
Microservices
Architectural style for breaking down large applications into small, independent services
372
Network Infrastructure
Comprises hardware, software, services, and facilities for network support and management
373
Air Gapping
physical separation of systems
374
Logical Separation
■ Establishes boundaries within a network to restrict access to certain areas ■ Implemented using firewalls, VLANs, and network devices
375
SDN
softwre defined network Enables dynamic, programmatically efficient network configuration Provides a centralized view of the entire network
376
SDN Architecture
Decouples network control and forwarding functions
377
SDN Architecture - Data Plane
forwarding plane Responsible for handling data packets Concerned with sending and receiving data
378
SDN Architecture - Control Plan
Centralized decision-maker in SDN Dictates traffic flow across the entire network Replaces traditional, distributed router control planes
379
SDN Architecture - App Plan
Hosts all network applications that interact with the SDN controller ○ Applications instruct the controller on network management ○ Controller manipulates the network based on these instructions
380
IaaC
Infrastructure as Code Automates provisioning and management through code Used in DevOps and with cloud computing
381
Centralized Architecture
All computing functions managed from a single location or authority
382
Decentralized Architecture
No single point of control; each node operates independently
383
IoT
internet of things Network of physical devices with sensors, software, and connectivity
384
Hub/Control System
Central component connecting IoT devices Collects, processes, analyzes data, and sends commands
385
Smart Devices
Everyday objects enhanced with computing and internet capabilities
386
Wearables
Subset of smart devices worn on the body
387
Sensor
Detect changes in environment, convert into data
388
ICS
Industrial Control Systems -Systems used to monitor and control industrial processes, found in various industries like electrical, water, oil, gas, and data
389
DCS
Distributed Control Systems Used in control production systems within a single location
390
PLC
Programmable Logic Controllers Used to control specific processes such as assembly lines and factories
391
SCADA Systems
Supervisory Control and Data Acquisition Type of ICS designed for monitoring and controlling geographically dispersed industrial processes
392
Embedded System
Specialized computing components designed for dedicated functions within larger device
393
RTOS
real time operating system Designed for real-time applications that process data without significant delays Critical for time-sensitive applications like flight navigation and medical equipment
394
Wrappers
Protect data during transfer by hiding data interception points
395
Firmware Code Control
Manage low-level software to maintain system integrity
396
OTA
over the air updates
397
Ports
Logical communication endpoints on a computer or server
398
Well known ports
0-10230
399
Registered ports
1024-49151 vendor specific registered with IANA
400
Dyanmic and private ports
49152-65535
401
Firewall
A network security device or software that monitors and controls network traffic based on security rules ■ Protects networks from unauthorized access and potential threats
402
Screened Subnet or Duel-homed Host
DMZ acts as a security barrier between external untrusted networks and the internal network uses firewalls
403
Packet filtering firewall
limited inspection of packet headers for IP addresses and port numbers operates at layer 4 transport layer
404
Stateful Firewall
It allows return traffic for outbound requests operates at layer 4
405
Proxy Firewall
Makes connections on behalf of endpoints two types: circuit layer (layer 5) app layer (layer 7)
406
Kernel proxy firewall
minimal impact on network performance full inspection of packets at eveyr layer placed closed to system they protect
407
NGFW
next gen firewall application aware and can distinguish between different types of traffic Example: it may allow aql server traffic regardless of the port # used conducts deep packet analysis and use signature based intrusion protection -
408
UTF
unified threat management firewall -combines multiple security functions in a single device single point of failure
409
WAF
web application firewall prevents against cross site scripting and SQL injections can be placed in line (live attack prevention) where the device sits between the network firewall and the web servers or out of line (detectio) device receives a mirroed copy of web server traffic
410
Layer 4 Firewall
operates at the transport layer filters traffic based on port numbers and protocol data
411
Layer 7 firewall
operates at app layer inspects filters and controls traffic based on content and data characteristics
412
ACL
access control lists consist of permit and deny statements often based on port numbers rule sets placed on firewalls, routers and network infrastructure devices includes types of traffic source destination and action to be taken against the traffic
413
Hardware based firewall
a dedicated network security device
414
software based firewall
A firewall that runs as a software application on individual devices, such as workstations ● Utilizes ACLs and rules to manage incoming and outgoing traffic, providing security at the software level on a per-device basis
415
IDS
intrusion detection system Logs or alerts that it found something suspicious or malicious
416
NIDS
Network-based IDS Monitors the traffic coming in and out of a network
417
HIDS host-based
Looks at suspicious network traffic going to or from a single or endpoint
418
WIDS
wireless IDS Detects attempts to cause a denial of a service on a wireless network
419
Signature based IDS
Analyzes traffic based on defined signatures and can only recognize attacks based on previously identified attacks in its database
420
Signature based IDS Pattern Matching
specific pattern of steps NIDS and WIDS
421
Stateful matching
known system baseline HIDS
422
Anomaly based IDS
Analyzes traffic and compares it to a normal baseline of traffic to determine whether a threat is occurring Five Types of Anomaly-based Detection Systems ■ Statistical ■ Protocol ■ Traffic ■ Rule or Heuristic ■ Application-based
423
IPS
Logs, alerts, and takes action when it finds something suspicious or malicious Scans traffic to look for malicious activity and takes action to stop it
424
Network Appliance
A dedicated hardware device with pre-installed software for specific networking services
425
Load Balancer
Distribute network/application traffic across multiple servers ● Enhance server efficiency and prevent overload ● Ensure redundancy and reliability ● Perform continuous health checks ● Application Delivery Controllers (ADCs) offer advanced functionality
426
Proxy Server
Act as intermediaries between clients and servers Provide content caching, requests filtering, and login management Enhance request speed and reduce bandwidth usage Add a security layer and enforce network utilization policies Protect against DDoS attacks
427
Jump server/jump box
Secure gateways for system administrators to access devices in different security zones -Control access and reduce the attack surface areaSecure gateways for system administrators to access devices in different secuA jump server is placed between a user's workstation and the target servers or devices, providing a controlled point of access. It helps isolate the internal network from potential threats originating from external networks.
428
Port Security
A network switch feature that restricts device access to specific ports based on MAC addresses
429
Network Switches
Networking devices that operate at Layer 2 of the OSI model Use MAC addresses for traffic switching decisions through transparent bridging
430
CAM table
Content Addressable Memory Stores MAC addresses associated with switch ports Vulnerable to MAC flooding attacks, which can cause the switch to fail open
431
802.1x authentication
Provides port-based authentication for wired and wireless networks Requires three roles ● Supplicant ● Authenticator ● Authentication server (RADIUS or TACACS+
432
RADIUS
Remote Authentication Dial-In User Service) is a protocol that manages authentication, authorization, and accounting (AAA) for users who connect to the network. cross platform
433
TACACS+
TACACS+ is slower but offers additional security and independently handles authentication, authorization, and accounting CISCO
434
EAP
(Extensible Authentication Protocol) you walk up to a building, a guard comes up and asks for a form of identification could be a driver's license, etc this is like the different variants of EAP then your credentials are forwaded to the RADIUS server whcih checks them against a database
435
EAP-MD5
Uses simple passwords and the challenge handshake authentication process to provide remote access authentication ○ One-way authentication process ○ Doesn’t provide mutual authentication
435
EAP TTLS
REquires a digital certificate on the server, but not on the client ○ The client uses a password for authentication
435
EAP TLS
Uses public key infrastructure with a digital certificate which is installed on both the client and the server ○ Uses mutual authentication
436
EAP-FAST
Uses protected access credential, instead of a certificate, to establish mutual authentication
437
PEAP
Supports mutual authentication using server certificates andActive Directory databases to authenticate a password from the client
438
EAP LEAP
Cisco proprietary and limited to Cisco devices
439
VPN
virtual private network Extend private networks across public networks
440
Site to Site VPN
Connects two sites cost-effectively Replaces expensive leased lines Utilizes a VPN tunnel over the public internet Encrypts and secures data between sites
441
Client to Site VPN
Connects a single host (e.g., laptop) to the central office Ideal for remote user access to the central network Options for full tunnel and split tunnel configurations
442
Clientless VPN
Uses a web browser to establish secure, remote-access VPN No need for dedicated software or hardware client Utilizes HTTPS and TLS protocols for secure connections to websites
443
Full tunnel VPN
Encrypts and routes all network requests through the VPN ○ Provides high security, clients fully part of central network ○ Limits access to local resources ○ Suitable for remote access to central resources
444
Split Tunnel VPN
Divides traffic, routing some through the VPN, some directly to the internet Enhances performance by bypassing VPN for non-central traffic
445
TLS
Provides encryption and security for data in transit Used for secure connections in web browsers (HTTPS) operates at layer 4 Transport layer TLS: Operates at the Transport Layer, securing individual connections between applications. IPSec: Operates at the Network Layer, securing IP packets and often used for creating secure network tunnels
446
DTLS
datagram TLS A faster User Datagram Protocol-based (UDP-based) alternative Ensures end-user security and protects against eavesdropping in clientless VPN connections
447
IPSec
A secure protocol suite for IP communication IPSec: Operates at the Network Layer, securing IP packets and often used for creating secure network tunnels
448
IPSec Transport Mode
securing the payload of the IP packet
449
IPSec Tunnel Mode
Provides confidentiality for both payload and header Adds a new header to encapsulate the entire packet
450
AH
AH adds an extra header to the original IP packet. This header contains a cryptographic hash of the packet’s content, which allows the recipient to verify that the packet has not been altered. : Think of AH as sending a sealed and stamped letter (packet) where the recipient can verify that the letter has not been tampered with and is indeed from the sender, but anyone can still see the content of the letter.
451
ESP encapsulating security payload
Provides confidentiality, integrity, and encryption ● Provides replay protection ● Encrypts the packet’s payload Think of ESP as sending a sealed and locked box (packet) that not only ensures the recipient can verify the sender and check for tampering but also keeps the contents of the box hidden from anyone who doesn't have the key.
452
SD-WAN
Software defined wide area network is a technology that simplifies the management and operation of a WAN (Wide Area Network) by separating the networking hardware from its control mechanism using software. Here’s a simple explanation: Without SD-WAN: It’s like driving without a GPS, relying on static maps and hoping for the best route, even if traffic conditions change. With SD-WAN: It’s like using a GPS that constantly updates your route based on real-time traffic information, ensuring you always take the fastest and most efficient path to your destination.
453
SASE
Secure Access Service Edge) A network architecture combining network security and WAN capabilities in a single cloud-based service SD-WAN is a foundational component of SASE. It provides the network optimization and dynamic routing capabilities. SASE builds on SD-WAN by adding comprehensive security services
454
Security Zones
Isolate devices with similar security requirements
455
Fail open
allows traffic to pass during a failure
456
Fail closed
Blocks all traffic during a failure, prioritizing security over connectivity
457
Least Privilege
Users and systems should have only necessary access rights to reduce the attack surface
458
Defense in Depth
Utilize multiple layers of security to ensure robust protection even if one control fails
459
Risk Based Approach
Prioritize controls based on potential risks and vulnerabilities specific to the infrastructure
460
Lifecycle Management
Regularly review, update, and retire controls to adapt to the evolving threat landscape
461
Open design principle
Ensure transparency and accountability through rigorous testing andscrutiny of controls
462
IAM Solutions
Ensures right individuals have right access to right resources for right reasons ● Password Management ● Network Access Control ● Digital Identity Management
463
IAAA
identification, authentication, authorization, and accounting
464
Identification
User claims an identity using a unique identifier (e.g., username or email address
465
Authentication
Verifies the identity of a user, device, or system ● Typically involves validating user credentials against an authorized user database
466
Authorization
Determines the permissions or access levels for authenticated users
467
Accounting
tracks and records user activities
468
Provisioning
Creating new user accounts, assigning permissions, and providing system access
469
Deprovisioning
Removing access rights when no longer needed (e.g., when an employee leaves
470
Identity Proofing
Process of verifying a user's identity before creating their accoun
471
Interoperability
Ability of different systems, devices, and applications to work together and share information ● In IAM, it can involve using standards like SAML or OpenID Connect for secure authentication and authorization
472
MFA
A security system requiring multiple methods of authentication from independent categories of credentials
473
Passkeys
An alternative to traditional passwords for authentication Involves creating a passkey secured by device authentication methods like fingerprint or facial recognition
474
Password Manager
password generation auto fill secure sharing cross platform access
475
OTP
one time passwords
476
Magic link
one time links sent to email for auto login
477
Brute force password attack
Tries every possible character combination until the correct password is found
478
Dictionary attack
Uses a list of commonly used passwords (a dictionary) to crack passwords
479
Password Spraying
A form of brute force attack that tries a few common passwords against many usernames or account
480
Hybrid Attack
Combines elements of brute force and dictionary attacks May include variations, such as adding numbers or special characters to passwords
481
SSO
single sign on Authentication process allowing users to access multiple applications with one set of credentials
482
LDAP
Lightweight Directory Access Protocol) -protocol for SSO -Lightweight Directory Access Protocol) -Can share user information across network resources
483
OAuth
Allows third-party services to access user account information without exposing passwords
484
SAML
Redirects users to an identity provider for authentication
485
Federation
Links electronic identities and attributes across multiple identity management systems -Enables users to use the same credentials for login across systems managed by different organizations
486
PAM
priviledged access managment Solution that restricts and monitors privileged access within an IT environment
487
JIT Permissions
Security model that grants administrative access only when needed for a specific task
488
Password Vaulting
Technique that stores and manages passwords securely, often in a digital vault.
489
Temporal accounts
Temporary accounts used for time-limited access to resources
490
MAC
Uses security labels to authorize resource access Requires assigning security labels to both users and resources
491
DAC
discretionary access control Resource owners specify which users can access their resources
492
RBAC
Role-Based Access Control
493
Rule based access control
Uses security rules or access control lists ● Policies can be changed quickly and frequently ● Applied across multiple users on a network segment
494
ABAC
attribute base access control user attributes, environment attributes etc
495
Privileges
Define the levels of access that users have
496
UAC
A mechanism designed to ensure that actions requiring administrative rights are explicitly authorized by the use
497
Firmware Vulnerabilities
Specialized software stored on hardware devices ● Can grant attackers full control, leading to unauthorized access or takeover
498
End of Life systems assessment
No updates or support from the manufacturer
499
Legacy system
Outdated and superseded by newer alternatives
500
unsupported system
no official support ever
501
hardening
Tighten security by closing unnecessary ports, disabling services, and setting permission
502
Patching
Regular updates to fix known vulnerabilities in software, firmware, and applications
503
Bluetooth
Wireless technology for short-distance data exchange
504
Insecure Pairing
Occurs when Bluetooth devices establish a connection without proper authentication
505
Device spoofing
Occurs when an attacker impersonates a device to trick a user into connecting
506
On Path attcks
Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware
507
Bluejacking
Sending unsolicited messages to a Bluetooth device ● Often used for pranks or testing vulnerabilities
508
Bluesnarfing
Unauthorized access to a device to steal information like contacts, call logs, and text messages
509
Bluebugging
Allows attackers to take control of a device's Bluetooth functions
510
Bluesmack
DOS
511
Sideloading
Installing apps from unofficial sources bypassing the device's default app store
512
Jailbreaking/rooting
Gives users escalated privileges but exposes devices to potential security breaches
513
Zero Day
Discovered or exploited before vendors issue patches
514
Malicious updates
Appear as legitimate security updates but contain malware or exploits
515
Injection Attack
Involves sending malicious data to a system for unintended consequences
516
SQL Data
used to interact with databases
517
SQL injection
Involves inserting malicious SQL code into input fields
518
XML Data
Used for data exchange in web applications
519
XML Bomb
billions laigh attack Consumes memory exponentially, acting like a denial-of-service attack
520
XXE
xml external entity attack Attempts to read local resources, like password hashes in the shadow file
521
XSS
cross site scripting Injects a malicious script into a trusted site to compromise the site’s visitors
522
Non persistent XSS
A XSS attack that only occurs when it is launched and only happens once ○ Server executes the attack (Server-side scripting attack)
523
Persistent XSS
Allows an attacker to insert code into a backend database used by that trusted website
524
DOM XSS
document object model Exploits the client’s web browser using client-side scripts to modify the content and layout of the web page
525
Session management
Enables web applications to uniquely identify a user across several different actions and requests
526
Cookie
Text file used to store information about a user when they visit a website
527
Non persistent cookies
■ Also known as a session cookie ■ Resides in memory and are used for a very short time period ■ Deleted at the end of the session
528
Persistent Cookies
Stored in the browser cache until either deleted by a user or expire
529
Session hijacking
Type of spoofing attack where the attacker disconnects a host and then replaces it with his or her own machine by spoofing the original host IP
530
Session prediction
Type of spoofing attack where the attacker attempts to predict the session token in order to hijack the session
531
XSRF
cross site request forgery Malicious script is used to exploit a session started on another site within the same web browser
532
Buffer overflow attack
Occurs when a process stores data outside the memory range allocated by the developer
533
Buffers
Temporary storage areas used by programs to hold data
534
Stack
Programs have a reserved memory area called a stack to store data during processing
535
Smashing the stack
Attackers aim to overwrite the return address with a pointer to their malicious code
536
NOP Slide
Attackers fill the buffer with NOP (No-Operation) instructions
537
ASLR
Address Space Layout Randomization mitigation against buffer attack
538
Race condition
Software vulnerabilities related to the order and timing of events in concurrent processes
539
Dereferencing
Software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing that the pointer was pointing to in the memory which allows changes to be made
540
Dirty Cow exploit
A real-world example of race condition exploitation
541
TOC
time of check Attackers manipulate a resource's state after it is checked but before it is used
542
TOU
Attackers alter a resource's state after it is checked but before it is used
543
TOE
time of evaulation Attackers manipulate data or resources during the system's decision-making or evaluation process ● Can lead to incorrect results or unexpected behavior
544
Mutex
Mutually exclusive flag that acts as a gatekeeper to a section of code so that only one thread can be processed at a time ○ Mutexes ensure only one thread or process can access a specific section of code at a time mitigation against race condition
545
Deadlock
Occurs when a lock remains in place because the process it’s waiting for is terminated, crashes, or doesn’t finish properly, despite the processing being complete
546
DoS
denial of service Used to describe an attack that attempts to make a computer or server’s resources unavailable
547
Ping flood
Overloading a server with ICMP echo requests (pings)
548
SYN flood
Initiating multiple TCP sessions but not completing the 3-way handshake
549
PDOS
permanent DoS exploits security flaws to break a networking device permanently by re-flashing its firmware
550
Fork Bomb
Attack creates a large number of processes, consuming processing power
551
DDoS
Malicious attempt to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of internet traffic
552
DNS amplification attack
Specialized DDoS that allows an attacker to initiate DNS requests from a spoof IP address to flood a website
553
Black hole or sink hole
Routes attacking IP traffic to a non-existent server through a null interface ● Effective but temporary solution
554
DNS
domain name system Fundamental component of the internet that is responsible for translating human-friendly domain names into IP addresses that computers can understand
555
556
DNSSEC
(Domain Name System Security Extensions) to add digital signatures to DNS data
557
DNS Cache Poisoning
aka DNS spoofing ● Corrupts a DNS resolver's cache with false information ● Redirects users to malicious websites
558
DNS Amplification attack
Overwhelms a target system with DNS response traffic by exploiting the DNS resolution process
559
DNS Tunneling
Encapsulates non-DNS traffic (e.g., HTTP, SSH) over port 53 Attempts to bypass firewall rules for command and control or data exfiltration
560
Domain hijacking or domain theft
Unauthorized change of domain registration
561
DNS Zone Transfer Attacks
Exposes sensitive information about a domain's network infrastructure
562
Directory Traversal attack
An injection attack occurs when the attacker inserts malicious code through an application interface
563
File inclusion
Web application vulnerability that allows an attacker either to download a file from an arbitrary location on the host file system or to upload an executable or script file to open a backdoor
564
Local File inclusion
An attacker adds a file to the web app or website that already exists on the hosting server
565
Arbitrary Code Execution
Vulnerability allows an attacker to run their code without restrictions
566
Remote Code execution
Type of arbitrary code execution that occurs remotely, often over the internet
567
Privilege Escalation
Gaining higher-level permissions than originally assigned
568
Horizontal privilege escalation
Accessing or modifying resources at the same level as the attacker
569
Rootkit
Class of malware that conceals its presence by modifying system files, often at the kernel level
570
Ring 0
the kernel
571
User mode rootkit
rings 1-3 has admin privileges
572
Replay attacks
Type of network-based attack where valid data transmissions are maliciously or fraudulently re-broadcast, repeated, or delayed ■ Involves intercepting data, analyzing it, and deciding whether to retransmit it later
573
Credential replay attack
Specific type of replay attack that Involves capturing a user's login credentials during a session and reusing them for unauthorized access
574
Session management
Enables web applications to uniquely identify a user across a number of different actions and requests, while keeping the state of the data generated by the user and ensuring it is assigned to that user
575
Session hijacking
A type of spoofing attack where the attacker disconnects a host then replaces it with his or her own machine, spoofing the original host's IP address
576
Session prediction attack
A type of spoofing attack where the attacker attempts to predict the session token to hijack a sessioC
577
Cookie poisoning
Modifies the contents of a cookie after it has been generated and sent by the web service to the client's browser so that the newly modified cookie can be used to exploit vulnerabilities in the web application
578
On path attack
An attack where the attacker positions their workstation logically between two hosts during communication
579
ARP Poisoning
Manipulating Address Resolution Protocol (ARP) tables to redirect network traffic
580
DNS Poisoning
Altering DNS responses to reroute traffic
581
Rogue Wireless Access Point
Creating a fake wireless access point to intercept traffic
582
Rogue hub or switch
Introducing a malicious hub or switch to capture data on a wired network
583
Replay attack
Occurs when an attacker captures valid data and then replays it immediately or with a delay
584
Relay attack
The attacker becomes part of the conversation between two hosts
585
SSL Stripping
An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS
586
Downgrade attack
An attacker forces a client or server to abandon a higher security mode in favor of a lower security mode
587
LDAP Injection
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user inpu
588
Command Injection
Occurs when a threat actor is able to execute arbitrary shell commands on a host via a vulnerable web application
589
Process injection
method of executing arbitrary code in the address space of a separate live process
590
IoC
indicators of compromise Pieces of forensic data that identify potentially malicious activity on a network or system
591
Least Functionality
Involves configuring systems with only essential applications and services
592
App allow listing
Only applications on the approved list are allowed to run
593
App blocklisting
Applications placed on the blocklist are prevented from running ■ All other applications are permitted to run
594
ToS
trusted OS An operating system that is designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access control
595
EAL
evaluation assurance level EAL 1 lowest EAL 7 highest
596
Hotfix
A software patch that solves a security issue and should be applied immediately after being tested in a lab environment
597
Update
Provides a system with additional functionality, but it doesn’t usually provide any patching of security related issues ■ Often introduce new vulnerabilities
598
Service Pack
Includes all the hotfixes and updates since the release of the operating system
599
Patch MAnagement
Planning, testing, implementing, and auditing of software patches
600