General Security Concepts Flashcards
(256 cards)
CIA Triad
Confidentiality, Integrity, and Availability
DAD Triade
Disclosure, Alteration, and Destruction
AAA
Authentication, Authorization, Accounting/Auditing
MSSP
Managed Security Service Provider. Offers network security services to an organization. It’s third party that can alleviate the strain on IT teams, and saves the organization time to expand and support operations.
Saas
Software as a service. A cloud based software delivery model that allows users to access software applications over the internet. Ex: Dropbox, Google Workspace, and Salesforce.
Iaas
Infrastructure as a service. A type of cloud computing service that offers essential compute, storage, and networking resources on demand also a pay as you go basis.
Paas
Platform as a service. A complete development and deployment environment in the cloud, with resources that enable you to deliver everything from cloud based apps to sophisticated, cloud-enabled enterprise application.
Daas
Desktop as a service. Provides a fully virtualized desktop environment from within a cloud-based service. (Virtualized desktop Infrastructure)
AES
Advanced Encryption Standard. A specification for the encryption of electronic data, and was established by the National Institute of Standards and Technology (NIST) in 2001. Blocker cipher. It is Symmetric.
Diffie-Hellman
Key exchange between two parties usually between VPNs, over a public channel to establish a mutual secret without it being transmitted over the internet. It enables the two to use public key to encrypt and decrypt their conversations or data using symmetric cryptography.
RSA
One of the first public key cryptosystems and used for data transmission. Asymmetric algorithm.
DSA
Asymmetric cryptographic algorithm.
ECC
Asymmetric cryptographic algorithm
Blowfish
A variable length that is symmetric, a 64 bit block cipher. General purpose algorithm. It was made to be used to provide a fast, and free drop in alternative to the DES data encryption standard and international encryption algorithm. IDEA
RCA
A form of stream cipher. It encrypts messages one byte at a time from an algorithm. Also a symmetric algorithm.
Incremental Backup Approach
Used when the amount of data has to be protected is too extensive to do a complete backup of that data everyday. Only backing up changed data. Incremental backups save restore time and disk space.
SQL Injection
Cyberattack that injects malicious (sql) code into an application allow the attacker to view or modify a database. One of the web application most serious attacks.
Web Application
Software that runs your software.
FTK Imager
Can create perfect copies for forensic images of computer data without making changes to the original evidence.
Memdump
Used to collect content within the RAM on a given host.
Autopsy
Used to collect, open source forensic tool suite.
Zero Day Vulnerability
In a software unpatched by the developer on an attack that exploits such a vulnerability.
ADT
Advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. Intends to steal data rather than to cause damage to the network or organization.
Spear Fishing
Fraudulent practice of sending emails ostensibly from a known or trusted sender to induce targeted individuals to reveal confidential information.