Cybersecurity Fundamentals Flashcards
(87 cards)
Microblogging
Microblogging web services allow a subscriber to broadcast short messages to other subscribers. Examples include Tumblr and Twitter.
Social Curation
Social curation shares collaborative content about particular topics. Social bookmarking is a type of social curation. Examples include Cogenz, Instagram, Pinterest, and Reddit.
Blockchain
Blockchain is essentially a data structure containing transactional records (stored as blocks) that ensures security and transparency through a vast, decentralized peer-to-peer network with no single controlling authority. Cryptocurrency, such as Bitcoin, is an example of a blockchain application.
Data Mining
Data mining enables patterns to be discovered in large datasets by using machine learning, statistical analysis, and database technologies.
Mixed Reality
Mixed reality includes technologies, such as virtual reality (VR), augmented reality (AR), and extended reality (XR), that deliver an immersive and interactive physical and digital sensory experience in real time.
Natural Language Search
Natural language search is the ability to understand human spoken language and context (rather than a Boolean search, for example) to find information.
TTP
Tactics
Techniques
Procedures
Port Hopping
Port hopping allows adversaries to randomly change ports and protocols during a session.
Using Non-Standard Ports
An example of using non-standard ports is running Yahoo! Messenger over TCP port 80 (HTTP) instead of the standard TCP port for Yahoo! Messenger (5050).
Tunneling
Another method is tunneling within commonly used services, such as running peer-to-peer (P2P) file sharing or an IM client such as Meebo over HTTP.
Hiding Within SSL Encryption
Hiding in SSL encryption masks the application traffic, for example, over TCP port 443 (HTTPS). More than half of all web traffic is now encrypted.
Cloud Service Models and Examples
SaaS - Google, MSFT, Zoom
PaaS - AWS, Azure, GCP
IaaS - AWS, Azure, GCP
SaaS
In a SaaS model, the capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure.
PaaS
In a PaaS model, the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.
IaaS
In an IaaS model, the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include OSs and applications.
Primary Function of SaaS
to provide cloud-based apps to consumers.
Primary Function of PaaS
The main function of PaaS is to give a useful framework for developers to manage new product apps, build apps, and test apps.
Primary Function of IaaS
The primary function of IaaS is to provide visual data centers to businesses.
Malicious Insiders
The least common but real SaaS application risk is the internal user who maliciously shares data for theft or revenge purposes.
Accidental Data Exposure
Well-intentioned end users are often untrained and unaware of the risks their actions pose in SaaS environments.
Accidental Share
An accidental share happens when a share meant for a particular person is accidentally sent to the wrong person or group.
Promiscuous Share
In a promiscuous share, a legitimate share is created for a user, but that user then shares with other people who shouldn’t have access.
Ghost (or Stale) Share
In a ghost share, the share remains active for an employee or vendor that is no longer working with the company or should no longer have access.
Cybercriminals
Cybercriminals are the most common attacker profile.
They are also known for the proliferation of bots and botnet attacks, where endpoints are infected and then organized collectively by a command-and-control, or C&C, attack server.