Comptia App Flashcards
(39 cards)
/etc/shadow file for Linux
Contain passwords and is a popular target for brute force attacks
Air Gap
Physical Separation that will require manual transport of files, patches, and other data between 2 environments. Security measure that involves physically isolating a computer or network and preventing it from establishing an external connection
Audio Steganography
Hiding a secret messages/data into an audio file
Bytes/Bits
Used in traditional data exchanges
CASB
Cloud Access Security Broker
Software tool/service. Acts as a gatekeeper allowing the organization to extend the reach of their security policies into the cloud
CER
Cross Error Rate – The point where FAR & the FRR cross over. Provides a means of comparing biometric systems based on efficiently…Lower CER = More desirable
Cryptographic Hashes
Used for integrity checking of files, network packets, and a variety of other applications
CSRF/XSRF (A.K.A.- Session Riding, Sea Surf)
Cross Site Request Forgery – takes advantage of the cookies and URL parameters legitimate sites used to help track serve their visitors. Tricks a web browser into executing an unwanted action in an application to which a user is logged in
DHCP
Dynamic Host Configuration Protocol
Sniffing or snooping can be enabled to prevent rouge DHCP servers as well as malicious DHCP traffic
Used to automatically assign an Internet Protocol (IP) address to any device on a network so they can communicate using IP
Assigns IP address to your laptop, phone, iPad etc. And when your use Wi-Fi at home the router is a DHCP server
Port 67 (server destination) 68 (client)
https://bluecatnetworks.com/glossary/what-is-dhcp/
DMZ
Demilitarized Zone – Perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic
ECC
Elliptic Curve Cryptography – key-based technique for encrypting data. Small key size but is still very secure
Used a lot in mobile devices. Asymmetric
Extranet
Private networks that allow access to partners or customers but not to the general public
FAR
False Acceptance Rate
Faraday Cage
Placed around an area or device to block electromagnetic signals (EMI – Electromagnetic interference)
Fileless Virus
Type of malicious activity that uses native, legitimate tools built into a system to execute an attack. Uses legitimate programs (PowerShell) to infect a computer
FRR
False Rejection Rate
HSM
Hardware Security Model - Physical device that acts as a secure crypto processor during the decryption process.
Tamper resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
Cryptoprocessor - carries out cryptographic operations
IaaS
Infrastructure as a Service – Provides essential compute, storage, and networking resources on demand.
Provides virtualized computing resources over the internet
Enables a consumer to outsource computing equipment purchases and running their own data center
Intranet
Internal service. Part of a network or website only accessible to individuals and systems inside of specific company
LDAP
Lightweight Directory Access Protocol
Protocol that facilitates directory creation, maintenance, and authentication
Open, vendor-neutral application protocol for accessing and maintaining that data
Client/server protocol used to access and manage directory information
Network repositories of network configuration information such as user accounts, groups…can use the TLS network security protocol.
Port 389…
Port 636 TLS/SSL…Provides encryption by default on this port (LDAPS)
MSSP
Managed Security Service Provider – Outside company that handles security tasks
Provides SECurity as a Service (SECaaS)
Network Load Balancers
Network Load Balancers
Distributes traffic among systems. Distributes network traffic across multiple WAN links, virtual machines, or servers to avoid overloading any single host without using complex routing protocols. Can also help monitor system performance, report on issues, and assure loads match the capabilities system
PaaS
Platform as a Service – Cloud computing where the hardware and software platform is provided by a third party
Enables consumers to rent fully configured systems that are set up for specific purpose
Private Cloud
On-Premises cloud computing