Comprehensive guide Chat GPT 2.0 Flashcards

(131 cards)

1
Q

AAL

A

Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BYOD

A

Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIA

A

Business Impact Analysis - Identifies critical business functions and the impact of disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA Triad

A

Confidentiality, Integrity, and Availability - The three core principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASB

A

Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCL

A

Common Control Line - CCL is used to define shared controls within organizations to manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CISO

A

Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CI/CD

A

Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CVE

A

Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVSS

A

Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNSSEC

A

Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DDoS

A

Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EAP

A

Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EDR

A

Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FIM

A

File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FIPS

A

Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fuzzing

A

A technique used to discover vulnerabilities by inputting random data into software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GPO

A

Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GDPR

A

General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HIDS
Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.
26
HIPS
Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.
27
HSM
Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.
28
IMSI
International Mobile Subscriber Identity - A unique identifier for a mobile user, used in cellular networks.
29
Incident Response Steps
1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
30
ISO
International Organization for Standardization - ISO 27001 outlines requirements for establishing an information security management system.
31
IDS
Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.
32
IPS
Intrusion Prevention System - An IPS can block malicious traffic in real time, preventing attacks.
33
MDM
Mobile Device Management - MDM solutions allow organizations to manage and secure employees' mobile devices.
34
MITM
Man-In-The-Middle - MITM attacks intercept communications between two parties to eavesdrop or alter messages.
35
NAC
Network Access Control - A solution that enforces security policies on devices accessing the network.
36
NIDS
Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.
37
NIPS
Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.
38
NIST
National Institute of Standards and Technology - NIST provides guidelines for improving the security of information systems across various industries.
39
PSTN
Public Switched Telephone Network - The traditional circuit-switched telephone network used for public telecommunication.
40
PKI
Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.
41
RAT
Remote Access Trojan - Malware that allows unauthorized remote access to a victim's computer.
42
RPO
Recovery Point Objective - A business aims for an RPO of one hour, meaning data loss should not exceed one hour’s worth of transactions.
43
RTO
Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.
44
RADIUS
Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.
45
Ransomware
A type of malware that encrypts files and demands payment for the decryption key.
46
Replay Attack
An attack where valid data transmission is maliciously or fraudulently repeated or delayed.
47
SAML
Security Assertion Markup Language - A standard for exchanging authentication and authorization data.
48
Sandboxing
Running untested code or applications in a controlled environment to prevent harm to the host system.
49
SHA
Secure Hash Algorithm - SHA is used to ensure data integrity by generating a unique hash for data.
50
SIEM
Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.
51
SOC
Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.
52
SOAR
Security Orchestration, Automation, and Response - Integrates security tools and processes to improve response times.
53
SPF
Sender Policy Framework - An email authentication method to prevent spoofing.
54
SSL
Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.
55
SSL/TLS
Secure Sockets Layer/Transport Layer Security - Protocols that encrypt data sent over the internet.
56
TACACS+
Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.
57
TFA
Two-Factor Authentication - An extra layer of security requiring two forms of verification.
58
TLS
Transport Layer Security - TLS encrypts data transmitted over the internet, securing online communications.
59
TPM
Trusted Platform Module - A hardware chip that provides cryptographic functions to secure hardware.
60
TTT
Tactics, Techniques, and Procedures - Understanding an attacker’s TTP helps in designing better defenses.
61
USB
Universal Serial Bus - A standard for connecting devices that may pose security risks if not managed properly.
62
VLAN
Virtual Local Area Network - A subgroup within a network that combines multiple physical networks.
63
WAF
Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.
64
WEP
Wired Equivalent Privacy - An outdated wireless security protocol that is no longer considered secure.
65
WPA
Wi-Fi Protected Access - A security protocol for wireless networks that is more secure than WEP.
66
WPA2
Wi-Fi Protected Access 2 - An enhancement to WPA that uses AES encryption for improved security.
67
XSS
Cross-Site Scripting - A vulnerability allowing attackers to inject scripts into web pages viewed by users.
68
XSRF
Cross-Site Request Forgery - An attack that tricks a user into executing unwanted actions on a web application.
69
Zero-Day
A vulnerability that is unknown to the vendor, with no patch available at the time of discovery.
70
Risk Formula
Risk = Threat × Vulnerability × Asset Value
71
Annual Loss Expectancy (ALE)
ALE = Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)
72
Single Loss Expectancy (SLE)
SLE = Asset Value × Exposure Factor (EF)
73
Bandwidth Utilization
Utilization = (Average Throughput / Total Bandwidth) × 100%
74
Symmetric Encryption
Encryption where the same key is used for both encryption and decryption.
75
Asymmetric Encryption
Encryption that uses a pair of keys: a public key for encryption and a private key for decryption.
76
Hashing
A process that converts data into a fixed-length string of characters, which is typically a digest that represents the data.
77
Incident Response Steps
1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
78
Preventive Controls
Controls that prevent security incidents from occurring.
79
Detective Controls
Controls that detect and alert on security incidents as they occur.
80
Corrective Controls
Controls that respond to and rectify security incidents.
81
Risk Formula
Risk = Threat × Vulnerability × Asset Value
82
Annual Loss Expectancy (ALE)
ALE = Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)
83
Single Loss Expectancy (SLE)
SLE = Asset Value × Exposure Factor (EF)
84
Bandwidth Utilization
Utilization = (Average Throughput / Total Bandwidth) × 100%
85
Symmetric Encryption
Encryption where the same key is used for both encryption and decryption.
86
Asymmetric Encryption
Encryption that uses a pair of keys: a public key for encryption and a private key for decryption.
87
Hashing
A process that converts data into a fixed-length string of characters, which is typically a digest that represents the data.
88
Incident Response Steps
1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
89
Preventive Controls
Controls that prevent security incidents from occurring.
90
Detective Controls
Controls that detect and alert on security incidents as they occur.
91
Corrective Controls
Controls that respond to and rectify security incidents.
92
FTP - Fish Tacos Please
File Transfer Protocol; used for transferring files.
93
SSH - Super Sneaky Hoppers
Secure Shell; secure remote login and file transfer.
94
SMTP - Sending Mail To Penguins
Simple Mail Transfer Protocol; used for sending emails.
95
DNS - Ducks Navigate Swiftly
Domain Name System; translates domain names to IP addresses.
96
DHCP - Dancing Hippos Celebrate Parties
Dynamic Host Configuration Protocol; assigns IP addresses.
97
HTTP - Hungry Tacos Please
Hypertext Transfer Protocol; used for web pages.
98
HTTPS - Hasty Turtles Protect Secrets
Hypertext Transfer Protocol Secure; secure web browsing.
99
POP3 - Pigeons Often Post
Post Office Protocol version 3; retrieves emails.
100
IMAP - Iguanas Mail A Lot
Internet Message Access Protocol; access email from multiple devices.
101
RDP - Really Daring Penguins
Remote Desktop Protocol; remote desktop connections.
102
Telnet - Turtles Enjoy Leisurely Netting
Insecure remote login.
103
TFTP - Tiny Frogs Transfer Files
Trivial File Transfer Protocol; simple file transfers.
104
NTP - Napping Turtles Party
Network Time Protocol; synchronizes clocks.
105
NetBIOS - Naughty Elephants Bathe In Oceans
Used for Windows file sharing and network communication.
106
SNMP - Silly Nerds Manage Penguins
Simple Network Management Protocol; network device management.
107
SMTPS - Silly Mice Take Protective Stances
Secure SMTP; secure email transmission.
108
Syslog - Silly Yaks Log Everything
Syslog protocol; for logging messages.
109
IPP - Irresistible Pizzas for Printing
Internet Printing Protocol; manages print jobs.
110
FTPS - Friendly Turtles Protect Secrets
Secure FTP; encrypted file transfers.
111
VNC - Vicious Newts Control
Virtual Network Computing; remote desktop access.
112
HTTP-alt - Hungry Tacos, Too!
Alternative HTTP service.
113
HTTP-proxy - Helpful Penguins Proxy
Alternative HTTP port often used for proxies.
114
HTTPS-alt - Happy Turtles Playing Securely
Alternate port for HTTPS traffic.
115
Webmin - Wacky Elephants Bring Mayhem
Webmin management interface.
116
MS RPC - Mice Share Really Pleasant Cookies
Microsoft Remote Procedure Call; service for Windows communication.
117
MS SQL - Many Squirrels Quickly Launch
Microsoft SQL Server; database communication.
118
NFS - Nifty Frogs Share
Network File System; file sharing across networks.
119
MySQL - My Sassy Quokka Loves
MySQL database server; communicates with databases.
120
UPnP - Unicorns Prefer Networking Parties
Universal Plug and Play; network device discovery.
121
RTSP - Really Tall Snakes Play
Real-Time Streaming Protocol; controls streaming media.
122
SIP - Silly Iguanas Party
Session Initiation Protocol; for initiating VoIP calls.
123
PostgreSQL - Pandas Go Swimming Quickly
PostgreSQL database; communication for the database.
124
Docker - Daring Otters Climb Kites
Default Docker port.
125
XMPP - Xylophones Make People Party
Extensible Messaging and Presence Protocol; for instant messaging.
126
VNC - Very Nice Chameleons
Virtual Network Computing; remote access.
127
X11 - Xylophones Play Loudly
X Window System; for GUI on Unix/Linux systems.
128
RealServer - Rabbits Enjoy Awesome Naps
Real-Time Streaming server.
129
HTTP-alt - Hungry Tacos, Part Two
Alternative HTTP service.
130
HTTP-proxy - Hungry Tacos, Again
Alternative HTTP port for proxy services.
131
HTTPS-alt - Happy Turtles at 8
Alternate port for HTTPS traffic.