Deck 1 Flashcards
(178 cards)
Cookie
A text file placed on a computer by a webpage or web app that stores information that can be used to customize a user’s experience. Can be targeted by an attacker to gain information on a host system, which can enable XSS or session hijacking.
Kerberos
A network protocol built on symmetric key cryptography that provides mutual authentication within a client-server model. Works on the basis of tickets to allow nodes on a non-secure network to prove their identity to one another in a secure manner. Uses UDP-88 by default. Version 5 uses AES.
TOGAF
The Open Group Architecture Framework (TOGAF) is a high-level framework for designing, planning, implementing and managing an enterprise IT architecture.
Modeled at four levels: Business, Application, Data and Technology.
ARP cache poisoning
An attack method that responds to ARP broadcast queries with falsified replies. Can also be caused by creating static ARP entries via ARP command.
ARP
Address Resolution Protocol (ARP) is a sub-protocol of the TCP/IP suite used to map IP network addresses to MAC hardware addresses used by a data link protocol.
X.509
The cryptography standard defining the format of public key certificates. TLS/HTTPS rely on these digital certs for secure web browsing. These certs can also be used offline in electronic signatures. An X.509 cert contains a public key and an ID; gets signed by a certificate authority.
Steganography
Cryptographic method, via a covert channel, to hide information within other information, such as embedding text within an image or saving a file in a different format than expected.
Trojan
A social engineering technique that exploits weaknesses in human nature by enticing a user to open and execute a file using impersonation or appealing language. Often involves an interesting PDF document in a phishing email that actually contains a malicious payload.
XACML
eXtensible Access Control Markup Language (XACML) is an XML standard that defines a fine-grained, attribute-based access control architecture, to streamline the exchange of provisioned users and resources between organizations. This kind of model separates the access decision from the point of use and supports role-based access control.
OSPF
Open Shortest Path First (OSPF) is a routing protocol that uses a link-state algorithm and operates as an interior gateway protocol within a single autonomous systems (AS). Suports Classless Inter-Domain Routing (CIDR) addressing.
BGP
Border Gateway Protocol (BGP) is a routing protocol that combines link-state and distance-vector routing algorithms to create a network topology for routing data on exterior gateways.
Blowfish
A 64-bit block symmetric key encryption algorithm that uses variable key length (32 to 448-bits) and puts the blocks through 16 rounds of crypto functions.
RDP
Remote Desktop Protocol (RDP), developed by Microsoft, provides the user with a Graphical User Interface (GUI) to connect to another computer over a network connection. By default RDP Server listens on tcp-3389 and udp-3389.
FRR
The false recognition rate (FRR) is the measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user. Typically measured as the ratio of false recogs / number of ID attempts.
FAR
The false acceptance rate (FAR) is the measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an UNauthorized user. Typically stated as the ratio of false accepts / number of ID attempts.
Phreaking
An attack whereby a telephone system is hacked using various tricks and techniques, in order to make free long-distance calls or steal specialized services.
LDAP
Lightweight Directory Access Protocol (LDAP) is the industry standard application protocol for accessing and maintaining directory information services over an IP network. Directory services is a common place to store usernames and passwords, or the hierarchical structure of organizational groups.
SOAP
Simple Object Access Protocol (SOAP) is an XML-based messaging protocol specification for exchanging structured data as part of a web services request. Relies on HTTPS or SMTP for message negotiation and transmission.
XML
eXtensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. Supports Unicode for different human languages. APIs are used to aid in the processing of XML data.
API
Application Programming Interface (API) is a set of subroutines, comm protocols and tools for building software, used to define methods of communication between disparate components, networks or organizations. An API may be for a web-based system, operating system, hardware component or software library.
REST
Representational State Transfer (REST) is a software architecture that defines a set of constraints to be used for web services. RESTful web services allow for stateless operations between disparate systems using payloads formatted in HTML, XML or JSON. The HTTP methods available are GET, HEAD, POST, PUT, PATCH, DELETE, CONNECT, OPTIONS and TRACE.
JSON
JavaScript Object Notation (JSON) is an open-standard file format that uses human-readable text to transmit data objects made up of attribute-value pairs and array data types. Common format for asynchronous browser-server coms as a replacement for XML. JSON file extension is .json.
NIST CSF
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a policy framework for how private sector orgs can improve their ability to identify, protect, detect, respond and recover from cyber attacks.
ISO27001
International Organization of Standards (ISO) 27001 is an information security standard that gives specific requirements for information security controls. The full string is ISO/IEC 27001:2013.