Brainscape Glossarry Flashcards
(579 cards)
PPTP
Point-to-Point Tunneling Protocol
Developed by Cisco and Microsoft to support VPNs over PPP and TCP/IP. PPTP is highly vulnerable to password cracking attacks and considered obsolete.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and procedures.
XaaS
anything as a service
Expressing the concept that most types of IT requirements can be deployed as a cloud service model.
ARP
ARP poisoning
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
asymmetric algorithm
A cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) algorithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example. Also known as Elliptic Curve Cryptography or ECC.
attack surface
The points at which a network or application receives external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.
attack vector
A specific path by which a threat actor gains unauthorized access to a system. Also known as vector.
authenticator
A PNAC switch or router that activates EAPoL and passes a supplicant’s authentication data to an authenticating server, such as a RADIUS server.
automation
Using scripts and APIs to provision and deprovision systems without manual intervention.
Autopsy
The Sleuth Kit is an open-source collection of command line and programming libraries for disk imaging and file analysis. Autopsy is a graphical frontend for these tools and also provides a case management/workflow tool. Also known as Sleuth Kit.
availability
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.
baseband radio
The chip and firmware in a smartphone that acts as a cellular modem.
baseline configuration
A collection of security and configuration settings that are to be applied to a particular system or network in the organization.
behavioral analysis
A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences. Also known as behavior-based detection.
birthday attack
A type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output. This means that different passwords may have the same hash; the attacker can use any of these passwords to gain access.
block cipher
A type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers.
blockchain
A concept in which an expanding list of transactional records listed in a public ledger is secured using cryptography.
blue team
The defensive team in a penetration test or incident response exercise.
bluejacking
Sending an unsolicited message or picture message using a Bluetooth connection.
bluesnarfing
A wireless attack where an attacker gains access to unauthorized information on a device using a Bluetooth connection.
boot attestation
Report of boot state integrity data that is signed by a tamper-proof TPM key and reported to a network server.
botnet
A set of hosts that has been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks. Also known as zombie.
BASH
Bourne again shell
A command shell and scripting language for Unix-like systems. bastion host A server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise.
BPDU guard
Bridge Protocol Data Unit guard
Switch port security feature that disables the port if it receives BPDU notifications related to spanning tree. This is configured on access ports where any BPDU frames are likely to be malicious.