Glossary Flashcards

(37 cards)

1
Q

Access Control List

A

A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Directory

A

The core identity store and authentication, authorization, and accounting service for many Windows-centric organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Monitoring

A

A technique that reaches out to remote systems and devices to gather data about availability, routes, packet delay or loss, and bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Reconnaissance

A

A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Persistent Threat

A

A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adverse Event

A

An event that has negative consequences, such as a malware infection on a system, a server crash, and users accessing a file, which they are not authorized to view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Analysis Utility

A

A utility that provides a number of useful capabilities that can offer insight into what occurred on a system, such as Windows Registry analysis, timelines of system changes, validation tools, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attrition

A

An attack that employs brute-force methods to compromise, degrade, or destroy systems, networks, or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Metric

A

The Common Vulnerability Scoring System ( CVSS ) metric that describes a validation barrier, which is required to be removed by an attacker to exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability

A

A cybersecurity objective that ensures information and systems are accessible to authorized users at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Beaconing

A

An activity sent to a command and control system as part of a botnet or a malware remote control system and is sent as either a HTTP or HTTPS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Buffer Overflow

A

An attack that occurs when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clear

A

A media sanitization option that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple noninvasive data recovery techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Closed source intelligence

A

A finding that is obtained through private sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Platform Enumeration

A

The Security Content Automation Protocol standard that provides a standard nomenclature for describing product names and versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Vulnerability Scoring System

A

The Security Content Automation Protocol standard that provides a standardized approach for measuring and describing the severity of security-related software flaws

17
Q

Containerization

A

The technology that allows the virtualization of a runtime environment such that the cloud customer can install or operate an application without needing an entire virtual machine or operating system

18
Q

Control Objectives for Information and Related Technologies COBIT

A

A set of best practices for IT governance developed by the Information Systems Audit and Control Association ISACA

19
Q

Cross Site Scripting XSS

A

An attack in which an attacker embeds scripting commands on a website that will later be executed by an unsuspecting visitor accessing that website

20
Q

Degaussing

A

A form of purging that uses extremely strong magnetic fields to disrupt stored data on a device

21
Q

DMZ

A

A special network zone designed to house systems that receive connections from the outside world

22
Q

Diamond Model of Intrusion Analysis

A

A model that describes a sequence where an adversary deploys a capability targeted at the infrastructure against a victim

23
Q

Domain Keys Identified Mail

A

An email authentication method designed to detect forged sender addresses in emails

24
Q

Evidence production procedure

A

A procedure that describes how an organization will respond to subpoenas, court orders, and other legitimate requests to produce digital evidence

25
Fagan inspection
A form of structured and formal code review intended to find a variety of problems during the development process of a product
26
Federal Information Security Management Act | FISMA
An act that requires government agencies and other organizations operating systems on behalf of government agencies to comply with a series of security standards
27
File Carving
A process of extracting data from a computer when that data has no associated file system metadata
28
Fuzzing
An automated testing technique in which a range of inputs is provided to software to look for problems such as buffer overflows, crashes, unexpected behavior, and so forth
29
Gramm-Leach-Bliley Act | GLBA
An act that governs how financial institutions may handle customer financial records
30
Guideline
A principle that provides best practices and recommendations related to a given concept, technology, or task.
31
Health Insurance Portability and Accountability Act | HIPAA
An act or regulation that includes security and privacy rules that affect healthcare providers, health insurers, and health information clearing houses
32
Hypervisor
A piece of software that enables virtualization on a computer
33
Incident Response
An organized approach to address and manage the aftermath of a security breach or cyberattack
34
Information Technology Infrastructure Library | ITIL
A set of IT management practices for aligning IT services with the needs of the business
35
Internet of Things
A general term for TCP/IP capable devices that provides limited sets of functions
36
Kerberos
A computer network authentication protocol that uses tickets to allow nodes and users to communicate over an insecure network to prove their identity
37
Nagios
A popular network and a system log monitoring tool that supports a broad range of plug-ins