Full List Flashcards

(82 cards)

1
Q

CIA

A
  • Confidentiality: prevent unauthorized information disclosure.
  • Integrity: data remains unaltered
  • Availability: information is accessible to authorized users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A
  • Authentication: prove your identity, e.g. password
  • Authorization: what resources you have access to.
  • Accounting: record of the resources used, e.g. login time, logout time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PKI

A

Public Key Infrastructure: A system of policies, procedures, and technology for managing digital certificates to securely link public keys to people or devices, enabling trusted communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPM

A

Trusted Platform Module: a microprocessor that provides cryptographic functions for a single device, e.g. storing BitLocker keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSM

A

Hardware Security Module: a dedicated device for storing and managing encryption keys for many devices, typically used in large environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CA

A

Certificate Authority: A trusted organization that issues and manages digital certificates to verify the identity of entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CRL

A

Certificate Revocation List: list of invalidated certificates that’s maintained by the Certificate Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OCSP

A

Online Certificate Status Protocol: real-time certificate validity checks through browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSR

A

Certificate Signing Request: request the Certificate Authority to issue a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMS

A

Short Message Service: a text messaging service that allows the exchange of short text messages between mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IM

A

Instant Messaging: the exchange of near-real-time messages through online software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MSP

A

Managed Service Providers: A company that manages IT infrastructure and services for organizations remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TOC/TOU

A

Time-of-check to Time-of-use: exploiting the gap between verification and execution in race conditions. A race condition is exploiting processes running simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQLi

A

Structured Query Language injection: injecting malicious SQL commands into a database query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XSS

A

Cross Site Scripting: injecting scripts into web pages viewed by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VM escape

A

Virtual Machine escape: gaining access to a host from a virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RFID cloning

A

Radio Frequency Identification cloning: duplicating RFID cards or tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DDoS

A

Distributed Denial of Service: flooding a service with requests from several computers to cause downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DNS attack

A

Domain Name System: exploiting vulnerabilities in DNS to redirect traffic from a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IoT

A

Internet of Things: A network of interconnected devices that communicate and exchange data over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VLAN

A

Virtual Local Area Network: a network segmentation technique that groups devices logically to improve performance and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ACL

A

Access Control List: a list of rules that lists access permissions based on an allow/deny list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HIPS

A

Host-based Intrusion Prevention System: a security software that detects and prevents unauthorized access to a system on a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IaC

A

Infrastructure as Code: Managing and provisioning infrastructure through code, useful in software development to build, test, and deploy applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SDN
**Software-defined Networking**: network infrastructure that enables the network to be centrally controlled using software applications.
26
ICS/SCADA
**Industrial Control Systems & Supervisory Control and Data Acquisition System**: systems used to monitor and control industrial processes, e.g. power generation, energy, manufacturing.
27
RTOS
**Real-time Operating System**: low-latency systems with high security demands, an OS with deterministic processing schedule, e.g. military environments.
28
IPS/IDS
**Intrusion Prevention/Detection System**: designed to monitor and alert (IDS) or actively block (IPS) malicious activities in a network.
29
PSK
**Pre-shared Key**: A shared password used for authentication in wireless networks like WPA2/WPA3.
30
EAP
**Extensible Authentication Protocol**: authentication framework for secure communication, can be used withan authentication database like RADIUS, LDAP, or TACACS+.
31
802.1X
**IEEE 802.1X**: port-based network access control that authenticates users using EAP
32
WAF
**Web Application Firewall**: a firewall that protects against web threats like SQL injection, it applies rules to HTTP/HTTPS conversations.
33
UTM
**Unified Threat Management**: all-in-one security appliance in one device, can contain IDS/IPS, URL filter, spam filter, etc.
34
NGFW
**Next-generation Firewall**: advanced firewall with application-layer filtering, has deep packet inspection.
35
VPN
**Virtual Private Network**: encrypting data going through a public network for secure remote access.
36
TLS
**Transport Layer Security**: encrypting data communication over a network through port 443 (HTTPS) at the application layer.
37
IPSec
**Internet Protocol Security**: secures internet communications by encrypting and authenticating data packets at the network layer.
38
SD-WAN
**Software-defined Wide Area Network**: a WAN built for the cloud giving efficient access to public cloud applications.
39
SASE
**Secure Access Service Edge**: a next-generation VPN that allows you to connect securely from different locations, or anywhere.
40
UPS
**Uninterruptible Power Supply**: battery backup to keep systems running temporarily during power loss.
41
MDM
**Mobile Device Management**: software for managing and securing mobile devices within an organization.
42
BYOD
**Bring Your Own Device**: employees using personal devices at work.
43
COPE
**Corporate-owned, personally enabled**: company provides the device with limited personal use.
44
CYOD
**Choose Your Own Device**: employees choose from pre-approved devices.
45
WPA3
**Wi-Fi Protected Access 3**: advanced encryption for web networks.
46
RADIUS
**Remote Authentication Dial-in User Service**: protocol that provides centralized authentication, authorization, and accounting (AAA) for users accessing a network.
47
OSINT
**Open-Source Intelligence**: the process of gathering publicly available information to assess threats.
48
CVSS
**Common Vulnerability Scoring System**: evaluate and rank reported vulnerabilities in a standardized way.
49
CVE
**Common Vulnerability Enumeration**: identifying and cataloging known vulnerabilities, maintained by MITRE.
50
SCAP
**Security Content Automation Protocol**: framework for managing security policies and compliance.
51
SIEM
**Security Information and Event Management**: centralised logging and analysis tool used to detect, analyze, and respond to security threats.
52
DLP
**Data Loss Protection**: protecting sensitive data from unauthorized sharing or data exflitration.
53
SNMP traps
**Simple Network Management Protocol traps**: alerts sent by devices to monitor systems.
54
URL scanning
**Uniform Resource Locator scanning**: analysis of URLs for malicious content.
55
DMARC
**Domain-based Message Authentication Reporting and Conformance**: builds on SPF and DKIM, letting domain owners set policies for handling unauthenticated emails and receive compliance reports.
56
DKIM
**DomainKeys Identified Mail**: digitally signs outgoing emails, validated by receivers using a public key in DNS.
57
SPF
**Sender Policy Framework**: list of all servers authorized to send emails for a domain.
58
NAC
**Network Access Controls**: controls and restricts device access to a network based on policies.
59
EDR/XDR
**Endpoint Detection and Response/Extended Detection and Response**: advanced tools for detecting and responding to endpoint or network based threats.
60
SSO
**Single Sign On**: enables users to authenticate on several sites with one set of credentials.
61
LDAP
**Lightweight Directory Access Protocol**: protocol for reading and writing directories over an internet network.
62
OAuth
**Open Authorization**: an authorization framework that determines what resource a user will be able to access.
63
SAML
**Security Assertions Markup Language**: open standard for authentication and authorization, not originally designed for mobile.
64
RBAC
**Role-based Access Control**: a security model where access permissions are assigned based on user roles within an organization.
65
PDACERL (Incident Response Phases)
* **Preparation** * **Detection** * **Analysis** * **Containment** * **Eradication** * **Recovery** * **Lessons Learned**
66
AUP
**Acceptable Use Policy**: defines acceptable usage of company resources.
67
SDLC
**Software Development Life Cycle**: the development process involved to build a software application, security must be applied at every stage.
68
SLE
**Single Loss Expectancy**: cost of a single incident
69
ALE
**Annualized Loss Expectancy**: yearly cost of a risk, ARO x SLE
70
ARO
**Annualized Rate of Occurrence**: frequency of incidents per year.
71
RTO
**Recovery Time Objective**: time to restore services after an incident.
72
RPO
**Recovery Point Objective**: maximum tolerable data loss measured in time.
73
MTTR
**Mean Time to Repair**: average time requested to fix issue.
74
MTBF
**Mean Time Between Failures**: time between outages, e.g. total uptime, number of breakdowns
75
SLA
**Service Level Agreement**: minumum terms for services provided, e.g. uptime, response time agreement.
76
MOA
**Memorandum of Agreement**: documenting mutual obligations, usually a formal or legal document.
77
MOU
**Memorandum of Understanding**: outlining informal agreements, states common goals.
78
MSA
**Master Service Agreement**: legal contract and agreement of terms, governs long term relationships.
79
WO/SOW
**Work Order/Statement of Work**: specific list of items to be completed, specific project terms.
80
NDA
**Non-disclosure Agreement**: protecting shared sensitive information, confidentiality agreement.
81
BPA
**Business Partners Agreement**: guidelines for business partnerships, lists specific individuals and scope.
82
MFA
**Multifactor Authentication**: A security method requiring multiple forms of verification, such as something you know (password), have (token), or are (biometric).