glossary of key terms Flashcards

1
Q

The maintenance and verification of a desired level of

quality of software, a product, or service.

A

quality assurance (QA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies that define the rules restricting how a computer, network, or other system may be used.

A

acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A list of permissions attached to an object specifying what level of access a user, users, or groups have to that object. When you’re
dealing with firewalls a set of rules that apply to a list of network
names, IP addresses, and port numbers

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of policies to determine the level of access
that a subject (user or system) has on a resource (the system, application, or data
to be protected). There are four major types

A
access control model / Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary
Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In digital forensics, the process of collecting specific data related to
an attack, intrusion, or investigation, which can include computer media and other
devices that store electronic data.

A

acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Microsoft directory service that authenticates and authorizes
users and computers.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker’s method that is carried out on a target mostly

by using network and vulnerability scanners.

A

active reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assessment that measures risk by using exact monetary values. It attempts to give an expected yearly loss in dollars for any given risk.
It also defines asset values to servers, routers, and other network equipment.

A

quantitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A load-balancing scenario in which each device performs work

simultaneously, thus sharing the load.

A

active/active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A load-balancing scenario in which one device actively performs
work while the other works in a standby mode.

A

active/passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A programming method involving
random arrangement of different address spaces used by a program (or process). It
helps prevent the exploitation of buffer overflows, remote code execution, and memory corruption vulnerabilities. It also can aid in protecting mobile devices (and other
systems) from exploits caused by memory-management problems

A

address space layout randomization (ASLR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Accounts on a system with higher-level privileges. They

are similar to root accounts on a Linux system.

A

administrator accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A sophisticated attack that can remain undetected for a long time. Also, a government (state actor) attack is often also referred
to

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The tactics, techniques,

and procedures used by attackers to compromise a system or a network.

A

adversary tactics, techniques, and procedures (TTPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A concept that refers to the gap or lack of connection between a computer
and other networks. Because the computer isn’t directly connected to the network, it
can’t be attacked through the network

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A list of allowed applications or functions that are accessible to a specific
resource, such as another application, a system, or a user. The list is inclusive; if the
application is not listed, access is denied

A

allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A VPN client that immediately and automatically establishes a
VPN connection when an Internet connection is made.

A

always-on VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The total expected loss in dollars per year due

to a specific incident.

A

annualized loss expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The number of times per year that a

specific incident occurs.

A

annualized rate of occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A method of obfuscating data such that the data can be used for
legitimate purposes while not exposing the identity of the data owner.

A

anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Software that protects against infections caused by many types of
malware, including all types of viruses, as well as rootkits, ransomware, and spyware.

A

antimalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer program used to prevent, detect, and remove

malware.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud-based services that don’t fall into SaaS, PaaS,
or IaaS. For example, when a large service provider integrates its security services
into the company/customer’s existing infrastructure, it is often referred to as Security as a service (SECaaS).

A

anything as a service (XaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A capability available in all cloud computing
environments. It allows for better automation of workflow deployment. These integrations typically need to be enabled in the environment to utilize them.

A

API inspection and integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An index of approved software applications or executable files that are permitted to be present and active on a computer system.
application approved list
26
An index or list of undesirable or unauthorized | programs used to prevent their execution.
application block list/deny list
27
Attacks that target the resources of Layer 7 applications and often leverage known vulnerabilities against specific software.
application DDoS attacks
28
A programmatic framework that enables other systems to interact with an application; however, lack of adequate controls and monitoring make effective security testing of _____ difficult to automate, which makes them vulnerable targets.
application programming interface (API)
29
A process to adequately and securely deploy an application on-premises or in the cloud.
application provisioning
30
Devices used to assess application-specific vulnerabilities | and operate at the upper layers of the OSI model.
application scanners
31
When an attacker manipulates the ARP cache on a host to | redirect traffic and perform an on-path attack.
ARP cache poisoning
32
Remnants of an intrusion that can be identified on a host or network
artifacts
33
A policy for onboarding and offboarding devices; it specifies how they are registered and activated and how they are later decommissioned.
asset management
34
A process that uses a public-key and private-key pair to | encrypt and decrypt messages when communicating.
asymmetric encryption
35
A set of matrices created by MITRE to document and explain the adversarial tactics and techniques used by attackers to compromise systems and networks.
ATT&CK
36
A process that serves to bear witness and to confirm, authenticate, verify, and document.
attestation
37
An access model that is dynamic and context-aware. Access rights are granted to users through the use of multiple policies that can combine various user, group, and resource attributes together.
attribute-based access control (ABAC)
38
An assessment that assigns numeric values to the | probability of a risk and the impact it can have on the system or network.
qualitative risk assessment
39
Characteristics that authenticate a user in either a physical or behavioral manner
attributes
40
A technique used to transmit hidden information by modifying an audio signal in an imperceptible manner.
audio steganography
41
The process or action of proving something to be true or valid, verifying the identity of a user or process.
authentication
42
A program that generates security codes for signing | into assets.
authentication application
43
As specified in RFC 4302, a protocol that defines an optional packet header to be used to guarantee connectionless integrity and data origin authentication for IP packets and to protect against replays.
Authentication Header (AH)
44
A nonmalicious hacker—for example, an IT person who | attempts to “hack” into a computer system before it goes live to test the system.
authorized hacker
45
A DevOps environment component for secure | provisioning and deprovisioning of software, services, and infrastructure.
automated courses of action
46
An automated way to share indicators of | compromise (IOCs) and threat intelligence information
automated indicator sharing (AIS)
47
The technology and processes of executing a task without human intervention.
automation
48
A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer.
Autopsy
49
A method used in computer programs to bypass normal authentication and other security mechanisms in place.
backdoor
50
A Common Vulnerability Scoring System (CVSS) group that represents the intrinsic characteristics of a vulnerability that are constant over time and do not depend on a user-specific environment.
base group
51
The original frequency range of transmission signal before it is modulated. It can also refer to the type of data transmission in which analog data is sent over a single nonmultiplex channel.
baseband radio
52
A method used to assess the current security state of computers, servers, network devices, and the network in general after a minimum desired state of security is defined.
baseline configuration (baselining)
53
The process of reporting the security state of computers, servers, network devices, and the network after a baseline has been determined.
baseline reporting
54
A Linux/UNIX-based scripting shell and framework.
Bash
55
Security controls that provide a unique way of making sure that people are who they say they are by monitoring/matching human characteristics such as a fingerprint, retina, or voice.
biometrics
56
An attack on a hashing system that attempts to send two different messages with the same hash function, causing a collision.
birthday attack
57
A way of testing the internal workings of an application or | system where the tester has no knowledge of the system being tested.
black-box testing
58
An encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text instead of encrypting one bit at a time as in stream ciphers.
block cipher
59
A list used to deny individual application access—a common | method used when working with email, and by antivirus and HIDS programs
block list/deny list
60
A term used to identity the defenders of an organization. ____ _____ typically include the computer security incident response team (CSIRT) and information security (InfoSec) team.
blue team
61
Sending unsolicited messages to Bluetooth-enabled devices such as mobile phones and tablets.
bluejacking
62
Accessing information without authorization from a wireless device through a Bluetooth connection.
bluesnarfing
63
A standalone post used for physical security purposes. It is typically steel, short, and sturdy, and anchored in a hard surface such as concrete.
bollard
64
A process that allows a remote platform to measure and report its system state in a secure way to a third party
boot attestation
65
The reliability of the operating system and loading mechanism during the booting process; it can be checked using a secure method
boot integrity
66
A large group of compromised systems known as robots or simply bots
botnet
67
``` Compromised computers (also known as zombies) that are part of a larger group called a botnet. They are used to distribute malware across the Internet. ```
bots
68
A password attack where every possible password is attempted.
brute-force attack
69
A situation that occurs when a process stores data outside the memory that the developer intended.
buffer overflow
70
The recognition and compensation provided by an organization to security researchers for reporting security vulnerabilities (which are basically bugs in code or hardware).
bug bounties
71
A current, tested plan in the hands of all personnel responsible for carrying out any part of that plan for the purpose of giving your organization the best shot at success during a disaster
business continuity plan (BCP)
72
Enacted in 2003, a law that requires California businesses that store computerized personal information to immediately disclose breaches of security.
California SB 1386
73
The complicating of source code to make it more difficult for people to understand. See also obfuscation.
camouflage
74
A method used by hotels, coffee shops, etc., that directs users to a web page for authentication (typically through email) prior to normal Internet use. The whole point of the technology is to be able to track users who access the free wireless network. If the user performs any suspect actions, that user can be traced by way of email address, IP address, and MAC address, in addition to other means if multifactor authentication is used.
captive portal
75
A method of user awareness training where students play in a red team/blue team scenario.
capture the flag
76
An attack method where the attacker clones a credit card, a | smartphone SIM card, or a building access badge or card.
card cloning attack
77
A Linux command that copies standard input to standard output
cat
78
an encryption protocol used with WPA2 that addresses | the vulnerabilities of TKIP and meets the requirements of IEEE 802.11i.
CCMP Counter Mode with Cipher Block Chaining Message Authentication Code (CBC-MAC) Protocol
79
``` An entity (usually a server) that issues certificates to users. ```
certificate authority (CA)
80
A list of digitally signed certificates revoked by the certificate authority for security purposes. If a certificate is compromised, it is revoked and placed on the ____. ____ are later generated and published periodically.
certificate revocation list (CRL)
81
Digitally signed electronic documents that bind a public key with a user identity.
certificates
82
A process that provides assurances that evidence has been controlled and handled properly after collection.
chain of custody
83
An authentication scheme used by the Point-to-Point Protocol (PPP), which in turn is the standard for dial-up connections. It uses a challenge-response mechanism with one-way encryption.
Challenge-Handshake Authentication Protocol (CHAP)
84
The process that is put in place to handle requests to make | changes to a system in a more efficient and coordinated manner.
change control
85
A structured way of changing the state of a computer | system, network, or IT procedure.
change management
86
The Linux command and system call that is used to change the access permissions of file system objects.
chmod
87
A device policy where employees select a | device from a company-approved list.
choose your own device (CYOD)
88
A set of algorithms that help secure a network connection that uses Transport Layer Security (TLS). The set of algorithms that _____ _____ usually contain include a key exchange algorithm, bulk encryption algorithm, and message authentication code (MAC) algorithm.
cipher suite
89
The process of completely removing any residual files or data from target systems after the testing phases of a penetration testing engagement are complete.
cleanup
90
Anything that is being performed (a command, script, or otherwise) at the client end of the communication. Typically executed on the client’s browser rather than on the web server, it allows for more responsive web applications.
client-side execution
91
The ability to properly handle application and user input to | prevent a security vulnerability and client-side execution.
client-side validation
92
A tool that is utilized in organizations to | control access to and use of cloud-based computing environments.
cloud access security broker (CASB)
93
A framework established by the Cloud Security Alliance | for cloud computing.
Cloud Controls Matrix
94
The act of reusing third-party, open-source software, or code developed internally by an organization.
code reuse
95
A location belonging to an organization that has tables, chairs, bathrooms, and possibly some technical setup—for example, basic phone, data, and electric lines. Otherwise, a lot of configuration of computers and data restoration is necessary before the site can be properly utilized. This type of site is used only if a company can handle the stress of being nonproductive for a week or more.
cold site
96
A situation that occurs when two different files end up using the same hash, which is possible with less secure hashing algorithms.
collision
97
The controlling master computer directing the actions of | a botnet, which distributes Internet malware.
command and control
98
A standard that enables different stakeholders across different organizations to share critical security-related information in a single format, speeding up information exchange and digestion.
Common Security Advisory Framework (CSAF)
99
A standard created by MITRE (www.mitre.org) that provides a mechanism to assign an identifier to vulnerabilities so that you can correlate the reports of those vulnerabilities among sites, tools, and feeds.
Common Vulnerabilities and Exposures (CVE)
100
A mix of public and private cloud deployments where multiple | organizations can share the public portion
community cloud
101
Mechanisms put in place to satisfy security requirements that are either impractical or too difficult to implement. For example, instead of using expensive hardware-based encryption modules, an organization might opt to use network access control (NAC), data loss prevention (DLP), and other security methods. Or, on the personnel side, instead of implementing segregation of duties, an organization might opt to do additional logging and auditing. Also known as alternative controls.
compensating controls
102
A program that translates, verifies, and processes source code created in a specific programming language.
compiler
103
Program errors that occur while the program is being | compiled.
compile-time errors
104
An access control model where access is granted based on specific criteria requirements.
conditional access
105
A classification of information where unauthorized access to the information would cause damage to national security.
confidentia
106
An ongoing process created with the goal of maintaining computer systems, servers, network infrastructure, and software in a desired, consistent state.
configuration management
107
The process of reviewing system configurations to reveal | potential security problems.
configuration reviews
108
The use of various tools for securing containerized cloud computing environments. Some of these tools are native to the actual cloud computing environment, and some are third-party solutions and run on those environments.
container security
109
Logical units of software that package applications and all the dependencies needed to run it. ______ are lightweight, standalone executable software packages that include code, runtime environments, system tools, and related software libraries. Two of the most popular examples of ______ solutions are Docker and Linux LXC
containers
110
The methodology whereby access to information, files, systems or networks is controlled.
containment
111
Using a program to screen and/or exclude access to web | pages, URLs, or email deemed objectionable.
content URL/filtering
112
A federal initiative to encourage people and departments to plan to address how critical operations will continue under a broad range of circumstances.
continuity of operations planning (COOP)
113
A software development process in which developers produce | software in short cycles while making sure that the software is reliable and secure.
continuous delivery
114
The automation of the application deployment, provisioning, and underlying network components and infrastructure.
continuous deployment
115
A software development practice in which programmers merge, test, and deploy code changes in a central repository multiple times a day or several times per week.
continuous integration
116
A DevOps environment component that ensures applications and systems are operating correctly and securely.
continuous monitoring
117
A DevOps environment component where applications | and code must be validated in an automated fashion.
continuous validation
118
A device policy in which the company supplies employees with a phone that can also be used for personal activities.
corporate-owned, personally enabled (COPE)
119
Controls used after an event. They limit the extent of damage and help the company recover from damage quickly. Tape backup, hot sites, and other fault tolerance and disaster recovery methods are also included here. They are sometimes referred to as compensating controls.
corrective controls
120
An encryption mode that uses an arbitrary number that changes with each block of text encrypted. The ______ is encrypted with the cipher, and the result is XOR’d (exclusive OR’d) into ciphertext. Because the _____ changes for each block, the problem of repeating ciphertext that results from the Electronic Code Book method is avoided.
counter mode
121
Information gathered and activities conducted to protect against espionage, other intelligence activities, or sabotage conducted by or on behalf of other elements.
counterintelligence
122
The attacking technique or activities of grabbing legitimate usernames and even passwords to gain access to systems to steal information or to use them for malicious purposes.
credential harvesting
123
Centralized enterprises run by people motivated mainly by | money (organized crime).
criminal syndicates
124
The point where the false rejection rate (FRR) and | the false acceptance rate (FAR) are equal.
Crossover Error Rate (CER)
125
A type of vulnerability where an attacker lures the targeted user to execute unwanted actions on a web application. Threat-performing _____ attacks leverage the trust that the application has in the targeted user.
cross-site request forgery (XSRF)
126
A web application vulnerability where an attacker can redirect a user to a malicious site, steal session cookies, or steal other sensitive information.
cross-site scripting (XSS)
127
Attacks against cryptographic implementations or against | crypto algorithms.
cryptographic attacks
128
An advanced form of ransomware that leverages advanced encryption techniques to prevent files from being decrypted without a unique key
cryptomalware
129
Open-source software/sandbox for automating analysis of suspicious files.
Cuckoo
130
A Linux command-line tool to transfer data to or from a server, using any of the supported protocols: HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE
curl
131
an industry standard used to | convey information about the severity of vulnerabilities.
CVSS Common Vulnerability Scoring System
132
A series of steps that trace stages of a cyber attack from the early reconnaissance stages to the exfiltration of data. The ____ _____ allows you to understand and combat ransomware, security breaches, and advanced persistent threats (APTs).
cyber kill chain
133
A type of risk transference (also known as risk sharing) that an organization can purchase to protect, for example, a group of servers in a data center.
cybersecurity insurance
134
A subset of the deep web where many threat actors perform malicious activities, such as selling stolen credit card numbers, health records, and other personal information.
dark web
135
Inactive data that is archived—backed up or stored in cloud storage services.
data at rest
136
The individual who has the greatest responsibility for data privacy protection. This person’s main responsibility is to control how the data is used by applying specific procedures for the data processes.
data controller
137
The individual who performs day-to-day tasks on behalf of the data owner. This person’s main responsibility is to ensure that the information is available to the end user and that security policies, standards, and guidelines are followed.
data custodian/steward
138
Data that crosses the network or data that currently | resides in computer memory. Also known as data in motion.
data in transit/motion
139
Actively used data undergoing constant change; for example, it could be stored in databases or spreadsheets.
data in use/processing
140
A system that performs content inspection and is designed to prevent unauthorized use of data as well as prevent the leakage of data outside the computer (or network) in which it resides.
data loss prevention (DLP)
141
A privacy enhancing technology designed to protect or obfuscate sensitive data
data masking
142
A method of minimizing the amount of personal information | that is consumed by online entities.
data minimization
143
Also called the information owner; a person who is usually part of the management team and maintains ownership of and responsibility over a specific piece or subset of data.
data owner
144
The organizational leadership role that is responsible for the overall protection and adherence to data protection processes within the organization.
data protection officer (DPO)
145
The process of restoring lost data, such as restoring a corrupt file from a backup.
data recovery
146
A policy that states how long data must be stored by an | organization.
data retention
147
The process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory/SSDs, mobile devices, CDs, DVDs, and so on) or in hard copy form
data sanitization
148
A concept that refers to any information (data) that has been converted and stored in a digital form.
data sovereignty
149
A command-line utility for Linux operating systems whose primary purpose is to convert and copy files.
dd
150
Software that is no longer in use, but the source code or binary for it still exists in the system and has not been removed appropriately.
dead code
151
``` A data destruction method involving the reduction or elimination of a magnetic field (or data) stored on tape and disk media such as computer and laptop hard drives, diskettes, reels, cassettes, and cartridge tapes. ```
degaussing
152
To adequately and securely remove, decommission, and purge an application and related data on-premises or in the cloud.
deprovision
153
Controls aimed at monitoring and detecting any unauthorized behavior or hazard. These types of controls are generally used to alert to a failure in other types of controls such as preventive, deterrent, and compensating controls.
detective controls
154
A control that is used by an organization to try to deter a | threat actor from executing an offensive assault on its environment.
deterrent controls
155
The environment where you create code on your computer or in | the cloud.
development
156
A security feature that protects against Layer 2 attacks such as DHCP spoofing and abuse.
DHCP snooping
157
A cybersecurity/threat intelligence model used to analyze and track the characteristics of cyber intrusions by advanced threat actors that emphasizes the relationships and characteristics of the adversary, capabilities, infrastructure, and victims.
Diamond Model of Intrusion Analysis
158
A password attack that uses a prearranged list of likely | words, trying each of them one at a time.
dictionary-based attack
159
Data backups that preserve data, saving only the difference | in the data since the last full backup.
differential backups
160
A Linux tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information.
dig
161
The name given to a set of access control technologies that are used to control the use of proprietary hardware, software, and copyrighted works. ____ solutions are used to restrict the use, modification, and distribution of copyrighted works and the underlying systems used to enforce such policies.
digital rights management (DRM)
162
Mathematical schemes for verifying the authenticity of digital messages or documents.
digital signatures
163
A method of accessing unauthorized parent (or worse, root) directories. It is often used on web servers that have PHP files and are Linux- or UNIX-based, but it can also be perpetrated on Microsoft operating systems. This attack is designed to get access to files such as ones that contain passwords. Also known as the ../ (dot-dot-slash) attack.
directory traversal
164
A formal document created by organizations that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks, or other disruptive events.
disaster recovery plan (DRP)
165
An access control policy generally determined by the owner. Objects such as files and printers can be created and accessed by the owner. Also, the owner decides which users are allowed to have access to the objects, and what level of access they may have. The levels of access, or permissions, are stored in access control lists (ACLs).
discretionary access control (DAC)
166
A technology that protects information by converting it into | unreadable code that cannot be deciphered easily by unauthorized people.
disk encryption
167
The principle behind writing data to two or more disks at the same time.
disk redundancy
168
A restricted variant of Basic Encoding Rules (BER) that allows for only one type of encoding, and has restrictive rules for length, character strings, and how elements are sorted. It is widely used for X.509 certificates.
Distinguished Encoding Rules (DER)
169
An attack in which a group of compromised systems attacks a single target, causing a denial of service to occur at that host.
distributed denial-of-service (DDoS) attack
170
Adequate distance between primary and secondary (or backup) sites; this is an important disaster recovery term.
diversity
171
The process of running code within the address space of another process by forcing it to load a dynamic link library. Ultimately, this can influence the behavior of a program in a way that was not originally intended.
DLL injection
172
a system utilized on networks to translate domain | names to IP addresses.
DNS Domain Name System
173
An attack that generates a high volume of packets ultimately intended to flood a target website.
DNS amplification attack
174
The modification of name resolution information that should be in a DNS server’s cache in order to redirect client computers to incorrect websites.
DNS poisoning
175
A suite of specifications that provide secure answer validation. It does this through public key cryptography. It is backward-compatible and can be deployed side by side with traditional DNS.
DNS Security Extensions (DNSSEC)
176
A deception and disruption technique used when you configure one or more DNS servers to provide false results to attackers and redirect them to areas in the network where you can observe their tactics and techniques
DNS sinkhole
177
A command-line tool that automatically identifies basic DNS records such as MX, mail exchange servers, NS, domain name servers, or the address record for a domain.
dnsenum
178
An attack in which the attacker changes the registration of a domain name without the permission of the original owner or registrant.
domain hijacking
179
A method that provides gateway-based cryptographic signing of outgoing messages. It allows you to embed verification data in an email header and for email recipients to verify the integrity of the email messages.
Domain Keys Identified Mail (DKIM)
180
``` The process of deleting a domain name during the five-day grace period (known as the add grace period, or AGP) and immediately reregistering it for another five-day period. This process is repeated any number of times with the end result of having the domain registered without ever actually paying for it. It is a malicious attack on the entire Domain Name System (DNS) by misusing the domain-tasting grace period. The result is that a legitimate company or organization often cannot secure the domain name of its choice. ```
domain name kiting
181
A technique to validate the authenticity of a domain and the | services using such domains (including websites and email messages).
domain reputation
182
The process the certificate authority uses to check the | rights of the applicant to use a specific domain name.
domain validation (DV)
183
A standard that was designed to thwart spammers from spoofing your domain to send email. Spammers can counterfeit the “From” address on an email message for it to appear to come from a user in your domain
Domain-based Message Authentication, Reporting & Conformance | DMARC
184
A type of attack in which a protocol (such as TLS or SSL) is downgraded from the current version to a previous version, exploiting backward compatibility
downgrade attack
185
Power that is supplied to the building via multiple paths; it ensures a single path failure does not interrupt power to the building.
dual supply
186
The process of trying to understand the source code of a program to adequately build a series of correct inputs for test coverage. Analysis software has the capability to find security issues caused by the code’s interactions with other system components.
dynamic code analysis
187
A method to determine if an ARP packet is valid based on IP-to-MAC address bindings stored in a trusted database.
Dynamic Host Configuration Protocol (DHCP) snooping
188
The capability of a cloud computing environment to efficiently allocate resources to tenants based on demand. Without this capability, a cloud-based computing environment would not be feasible.
dynamic resource allocation
189
A concept referring to network traffic flow within a data center between servers.
east-west traffic
190
An ecosystem of resources and applications in new network | services (including 5G and IoT).
edge computing
191
The process of identifying, preserving, collecting, processing, reviewing, and analyzing electronically stored information (ESI) in litigation.
E-discovery
192
The capability of an underlying infrastructure to react to a sudden increase in demand by provisioning more resources in an automated way
elasticity
193
The act of gaining knowledge or information from people
eliciting information
194
An approach to public-key cryptography | based on the algebraic structure of elliptic curves over finite fields
elliptic-curve cryptography (ECC)
195
Microprocessor-based computer hardware systems with software that is designed to perform a dedicated function, either as an independent system or as a part of a larger system.
embedded systems
196
Specified in RFC 4303; an optional packet header that can be used to provide confidentiality through encryption of the packet, as well as integrity protection, data origin authentication, access control, and optional protection against replays or traffic analysis.
Encapsulating Security Payload (ESP)
197
The process used to protect data by encoding plaintext data using cryptographic algorithms.
encryption
198
The date when a product or service will no longer be sold or | supported by a third party.
end of life (EOL)
199
Typically, the last day of service for a product, meaning a third party is no longer providing service if there is a failure.
end of service life (EOSL)
200
An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.
endpoint detection and response (EDR)
201
Often used interchangeably with endpoint security; security solutions that address endpoint device security issues, securing and protecting endpoints against zero-day exploits, attacks, and inadvertent data leakage resulting from human error.
endpoint protection
202
In cybersecurity, a measure of the randomness or diversity of a datagenerating function.
entropy
203
Cryptographic keys that can be used more than once within a single session, such as for broadcast applications, where the sender generates only one ephemeral key pair per message, and the private key is combined separately with each recipient’s public key
ephemeral keys
204
The process of engaging senior analysts and other stakeholders during the incident response process.
escalation
205
An expert at breaking into systems who can attack systems on | behalf of the system’s owner and with the owner’s consent.
ethical hacker
206
A rogue and unauthorized wireless access point that uses the same service set identifier (SSID) name as a nearby wireless network, often a public hotspot.
evil twin
207
Software packages that contain reliable exploit modules | and other hacker technique tools such as agents used for successful repositioning.
exploitation frameworks
208
Certificates that conduct a thorough vetting of an | organization. Issuance of these certificates is strictly defined.
extended validation (EV)
209
Specified in IETF RFC 3748 [18]; a framework for access authentication, which supports different authentication methods that are specified as ___ methods. As described in RFC 4017 [19], it is desirable for ___ methods used for wireless LAN to support mutual authentication and key derivation.
Extensible Authentication Protocol (EAP)
210
A type of Extensible Authentication Protocol authentication that uses a protected access credential instead of a certificate to achieve mutual authentication.
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling (EAP-FAST)
211
A type of Extensible Authentication Protocol authentication that uses Transport Layer Security, which is a certificate-based system that does enable mutual authentication. It does not work well in enterprise scenarios because certificates must be configured or managed on the client side and server side.
Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)
212
A type of Extensible Authentication Protocol authentication that uses Tunneled Transport Layer Security and is basically the same as TLS except that it is done through an encrypted channel and requires only server-side certificates.
Extensible Authentication Protocol - Tunneled Transport Layer Security (EAP-TTLS)
213
System decoys and breadcrumbs designed to lure and trick | attackers.
fake telemetry
214
The process of measuring the likelihood and probability that a biometric system will authorize a person who was not meant to be authorized.
false acceptance rate (FAR)
215
A network intrusion device’s inability to detect true security events under certain circumstances—in other words, a malicious activity that is not detected by the security device.
false negative
216
A situation in which a security device triggers an alarm, but no malicious activity or actual attack is taking place. In other words, ____ _____ are false alarms, and they are also called benign triggers.
false positive
217
The process of measuring the likelihood and probability that a biometric system fails to recognize an authorized user
false rejection rate (FRR)
218
An enclosure designed to block any RF signals from entering or leaving, or having effect on devices inside the cage.
Faraday cage
219
An array of programmable logic blocks and a hierarchy of “reconfigurable interconnects” that allow the blocks to be “wired together.” Logic blocks can be configured to perform complex combinational functions, or merely simple logic gates such as the AND gate, OR gate, and NOT gate.
Field-Programmable Gate Array (FPGA)
220
Systems used to store and track changes in source code | and files.
file and code repositories
221
A form of malware that functions without putting malicious executables within the file system and instead works in a memory-based environment.
fileless malware
222
The remote configuration and deployment of mobile devices performed via a messaging service, such as Short Message Service (SMS), Multimedia Messaging Service (MMS), Rich Communication Service (RCS), or Wireless Application Protocol (WAP).
firmware over-the-air (OTA) updates
223
The decentralization of computing infrastructure by “bringing the cloud to the ground” This architecture enables components of the edge computing concept to easily push compute power away from the public cloud to improve scalability and performance
fog computing
224
A by-product of attacker reconnaissance on an application, system, or network in order to find vulnerabilities that could potentially be exploited
footprinting
225
A process that deals with the recovery and investigation of material found in digital devices.
forensics
226
A proxy server that clients looking for websites, or files via an FTP connection, pass their requests through to the proxy.
forward proxy
227
A data preview and imaging tool that lets you quickly assess electronic evidence to determine whether further analysis with a forensic tool such as AccessData Forensic Toolkit (FTK) is warranted.
FTK Imager
228
A type of configuration in which all traffic is sent through the VPN tunnel back to the head end and out through the corporate network.
full tunnel
229
The process of encrypting data as it is written to the | disk and decrypting data as it is read off the disk. It is most applicable to laptops.
full-disk encryption (FDE)
230
An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
fuzzing
231
A European Union (EU) law that was enacted in 2018 with an overall focus on data protection and privacy for individuals.
General Data Protection Regulation (GDPR)
232
The use of a virtual fence defining the boundaries of an actual geographical area.
geofencing
233
The process of placing compute assets in strategic locations to ensure the ability to recover in case of an attack or natural disaster.
geographical dispersal
234
Law enacted in 1999 that enables commercial banks, investment banks, securities firms, and insurance companies to consolidate. It protects against pretexting. Individuals need proper authority to gain access to nonpublic information such as Social Security numbers.
Gramm-Leach-Bliley Act
235
A Linux command for finding matching patterns, to search for a string of characters in a specified file.
grep
236
The act of applying levels of security to protect applications from intellectual property theft, misuse, vulnerability exploitation, tampering, or even repackaging by people with ill intentions. Also known as application shielding.
hardening
237
The foundation on which all secure operations of a computing system depend.
hardware root of trust
238
Physical devices that act as secure cryptoprocessors. This means that they are used for encryption during secure login/ authentication processes, during digital signings of data, and for payment security systems. faster than software encryption.
hardware security modules (HSMs)(or a | Trusted Platform Module, or TPM)
239
A cryptographic function that is a mathematical algorithm used to map data of arbitrary size to a bit array of a fixed size.
hash
240
A one-way function where data is mapped to a fixed-length value.
hashing
241
A Linux-centric command that reads the first 10 lines of any given filename.
head
242
Law enacted in 1996 that | governs the disclosure and protection of health information.
Health Insurance Portability and Accountability Act
243
Components of a wireless site survey that shows all wireless activity in an area.
heat maps
244
A characteristic of a system which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
high availability
245
The components of a high availability environment deployed across multiple zones to greatly reduce the risk of an outage. In cloud computing environments, high availability is addressed using the concept of regions or zones.
high availability across zones
246
Hash-based password algorithm | that is used as a one-time password.
HMAC-based one-time password (HOTP)
247
An attempt to deceive people into believing something that is false.
hoax
248
A form of encryption enabling you to perform calculations on encrypted data without decrypting it first.
homomorphic encryption
249
Files used as bait intended to lure adversaries to access and then send alarms to security analysts for detection. They can also be used to potentially learn the tactics and techniques used by attackers.
honeyfiles
250
One or more computers, servers, or an area of a network that does not house any important company information and is designed to lure attackers so that you can study what tools and techniques they are using in order to discover potential network vulnerabilities.
honeynet
251
A computer, virtual machine (VM), or container that is used to attract attacker traffic to learn the adversary’s tactics, techniques, and procedures.
honeypot
252
A firewall installed on each individual desktop, laptop computer, or server that controls incoming and outgoing network traffic and determines whether to allow it into a particular device.
host-based firewall
253
An application that operates on information collected from individual computer systems. It can detect and alert on malicious activity but cannot stop this activity.
host-based intrusion detection system (HIDS)
254
A system that is capable of monitoring and analyzing the internals of a computing system “server” as well as the network packets on its network. It can prevent malware infiltration.
host-based intrusion prevention system (HIPS)
255
In its simplest form, a type of data center design that involves lining up server racks in alternating rows with hot air exhausts facing one way and cold air intakes facing the other.
hot aisle
256
A near duplicate of the original site of an organization that can be up and running within minutes (maybe longer). Computers and phones are installed and ready to go, a simulated version of the server room stands ready, and the vast majority of the data is replicated to the site on a regular basis in the event that the original site is not accessible to users for whatever reason.
hot site
257
A free TCP/IP packet generator, assembler, and analyzer that can be used to send large volumes of TCP traffic at a target while spoofing the source IP address, making it appear random or even originating from a specific user-defined source.
hping
258
A mixture of public and private clouds. Dedicated servers located within the organization and cloud servers from a third party are used together to form the collective network
hybrid cloud
259
A technique used to manipulate people’s sentiment (often political or religious beliefs) with potentially false information or propaganda.
hybrid warfare
260
The service provider that also manages the authentication | and authorization process on behalf of the other systems in a federation.
identity provider (IdP)
261
An IEEE standard that defines port-based network access control (PNAC). is a data link layer authentication technology used to connect devices to a LAN or WLAN. It defines EAP.
IEEE 802.1X
262
A command used to configure kernel-resident network interfaces. It is used at boot time to set up interfaces as necessary. It is used to view TCP/IP configurations on a Linux or macOS system.
ifconfig
263
A technique used to hide any kind of file inside an image | file.
image steganography
264
A valuation to determine the potential monetary costs related to a threat.
impact assessment
265
A concept related to geolocation and geofencing where a potential compromise is identified based on the fact that it would be impossible for a user to be in two places at once. For instance, if you authenticated at 3 p.m. EST from New York and 10 minutes later tried to authenticate from Florida. This would not be possible and is an indication of account compromise.
impossible travel time/risky login
266
A set of instructions to help IT staff detect, respond to, and recover from network security incidents. These types of plans address issues like cybercrime, data loss, and service outages that threaten daily work.
incident response plan
267
A group of IT professionals in charge of preparing for | and reacting to any type of organizational emergency
incident response team
268
A series of backup data sets in which daily changes to the data are compared to the state of the data on the previous day. They all have to be applied to the original full backup copy to come up with an up-to-date full backup copy.
incremental backups
269
Pieces of evidence or information that indicates a potential breach or compromise. Examples include command and control (C2) communications, IP addresses, domains, malware hashes, and other information.
indicators of compromise
270
The use of blended images where the surrounding scenery and the camouflaged structure appear as one, with the goal to deceive passersby to believe the structure is something else entirely
industrial camouflage
271
The process of protecting data or information by preventing unauthorized modification.
information assurance
272
A four-step process of data collection that includes collecting data, storing data, determining how data is used, and disposing of the data.
information lifecycle
273
Private-sector critical infrastructure organizations and government institutions that collaborate and share information between each other. exist for different industry sectors. Examples include automotive, aviation, communications, IT, natural gas, elections, electricity, financial services, health care, and many other
Information Sharing and Analysis Centers (ISACs)
274
A cloud service that offers computer networking, storage, load balancing, routing, and VM hosting
infrastructure as a service (IaaS)
275
The process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
infrastructure as code
276
The level of untreated risk in a process, system, or activity.
inherent risk
277
An attack against a cryptographic implementation used to reverse encryption methods (such as RC4) and/or recover a pre-shared key (PSK).
initialization vector (IV) attack
278
A category of attacks where the threat actor “injects” malicious code or malicious traffic.
injection attacks
279
A process that ensures the correct usage of data; it checks the data that is input by users into web forms and other similar web elements. If data is not validated correctly, it can lead to various security vulnerabilities, including sensitive data exposure and the possibility of data corruption.
input validation
280
A concept used by cloud access security broker solutions to | enforce policies on specific parts of an application
instance awareness
281
Errors that occur when arithmetic operations in a program attempt to create a numeric value that is too big for the available memory space. They create a wrap and can cause resets and undefined behavior in programming languages such as C and C++.
integer overflows
282
In a certificate chain, the body that signs the end-entity certificate. It then handshakes with the root certificate, which represents the root certificate authority. it not only creates the certificate but also signs it with its own private key.
intermediate certificate authority
283
The standards body that was originally established in 2005 and later updated in 2013 to address the topics of organizational context, involvement of leadership, planning and objectives, support including resources and communication, operational aspects, evaluation of performance, and continuous improvement.
International Organization for Standardization (ISO)
284
An Internet protocol that allows you | to access your email wherever you are, from any device.
Internet Message Access Protocol (IMAP)
285
An industry protocol created to collect and analyze network traffic flow information (metadata of the connections established between systems over a network).
Internet Protocol Flow of Information Export (IPFIX)
286
A Windows command-line tool that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain Name System settings.
ipconfig
287
A standard used to collect and analyze network flow information from infrastructure devices such as network switches and routers.
IPFIX
288
A principle that defines the architecture for security services for IP network traffic. Also known as Internet Protocol Security or IP Security protocol.
IPsec
289
The process of sending unsolicited wireless signals to cause interference or a denial of service condition.
jamming
290
A Linux command-line tool used for viewing logs that are collected by systemd.
journalctl
291
An authentication protocol designed at MIT that enables computers to prove their identity to each other in a secure manner. It is used most often in a client/server environment; the client and server both verify each other’s identity. This is known as two-way authentication or mutual authentication.
Kerberos
292
A process implemented to secure a copy of the user’s private key (not the public key) in case it is lost.
key escrow
293
A technique used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) needed to test each possible key.
key stretching
294
Spyware that records your keystrokes.
keylogger
295
Authentication of an individual based on knowledge of information associated with his or her claimed identity in public databases.
knowledge-based authentication (KBA)
296
Penetration test environment where the tester starts out with a significant amount of information about the organization and its infrastructure.
known environment
297
A post-exploitation technique, the main goal of which is to move from one device to another to avoid detection, steal sensitive data, and maintain access to these devices to exfiltrate the sensitive data. Lateral movement is also referred to as pivoting
lateral movement
298
A tunneling protocol used to connect virtual private networks. It does not include confidentiality or encryption on its own. It uses port 1701 and can be more secure than PPTP if used in conjunction with IPsec.
Layer 2 Tunneling Protocol (L2TP)
299
An attack similar to SQL injection; it uses a web form input box to gain access or exploits weak LDAP lookup configurations.
LDAP injection
300
An approach by which subjects are given only the necessary privileges needed to do their intended job.
least privilege
301
Technology solutions and platforms that are end-of-sale and | end-of-support by a vendor or considered obsolete.
legacy platforms
302
An encryption method that features a small footprint and/or low computational complexity. It is aimed at expanding the applications of cryptography to constrained devices such as the ever-expanding IoT market.
lightweight cryptography
303
A protocol used to read and write information to Active Directory. By default, LDAP traffic is transmitted unsecured, but you can enable LDAPS by using certificates.
Lightweight Directory Access Protocol over SSL (LDAPS)
304
A USB flash drive or external hard disk drive containing a full operating system that can be booted to.
live boot media
305
The act of collecting logs from multiple systems in a network.
log aggregation
306
Software that is able to receive logs from multiple sources (data input) and in some cases offers storage capabilities and log analysis functionality.
log collector
307
Code that has, in some way, been inserted into software; it is meant to initiate some type of malicious function when specific criteria are met.
logic bomb
308
An attack in which the attacker sniffs the network for valid | MAC addresses and then uses those MAC addresses to perform other actions.
MAC cloning attack
309
An attack that sends numerous unknown MAC addresses to | a network switch to cause a DoS condition.
MAC flooding attack
310
A set of rules or patterns that specify how certain input could trigger a command, a series of commands, or any other operation in a system.
macros
311
An access control policy determined by a | computer system, not by a user or owner, as it is in DAC.
mandatory access control (MAC)
312
The process of reading source code line by line in an | attempt to identify potential vulnerabilities.
manual code review
313
The average number of failures per million hours of operation for a product in question.
mean time between failures (MTBF)
314
The amount of time that an asset, system, or | application takes before it fails.
mean time to failure (MTTF)
315
The time needed to repair a failed device.
mean time to repair (MTTR)
316
the process of taking all information content in | RAM and writing it to a storage drive.
memdump A memory dump
317
A document that outlines the terms and details of an agreement between parties, including each party’s requirements and responsibilities.
memorandum of understanding (MOU)
318
Data created from every activity you perform, whether it’s on your personal computer or online, every email, web search, social and public application.
metadata
319
Physical devices that act as secure cryptoprocessors during secure login/authentication processes, during digital signings of data, and for payment security systems
MicroSD hardware security modules (HSMs)
320
A tool used by many penetration testers, attackers, and even malware that can be useful for retrieving password hashes from memory; it is a useful postexploitation tool.
Mimikatz
321
A globally-accessible knowledge base of adversary tactics, | techniques, and procedures (TTPs) based on real-world observations of cybersecurity threats.
MITRE ATT&CK
322
Centralized software solutions that can control, configure, update, and secure remote mobile devices such as Android, iOS, BlackBerry, and so on, all from one administrative console.
mobile device management (MDM)
323
An authentication method that requires the user to | provide two or more verification factors to gain access to a resource.
multifactor authentication
324
An Internet of Things implementation based on low-power wide-area (LPWA) technology developed to enable a wide range of new IoT devices and services.
NarrowBand-Internet of Things (NB-IoT)
325
A remote security scanning tool that scans a computer and notifies the practitioner if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer connected to a network.
Nessus
326
A back-end tool that allows for port scanning and port listening. In addition, you can actually transfer files directly through _____ or use it as a backdoor into other networked systems
netcat
327
A session flow protocol that collects and analyzes network traffic data that can be used to help you understand which applications, users, and protocols might be consuming the most network bandwidth or if a DoS activity is taking place and who the actors are.
NetFlow
328
A Windows and Linux command-line tool that generates a display showing network status and protocol statistics. It is used to view the current TCP/IP connections on a system.
netstat
329
Attacks that target network infrastructure resources (for example, bandwidth, CPU, and memory utilization of the underlying network infrastructure).
network DDoS attacks
330
The process of combining two or more | network interfaces to increase network capacity
network interface card (NIC) teaming
331
The process of adding additional instances of network devices and connections to help ensure network availability and decrease the risk of failure
network redundancy
332
A type of IDS that attempts to detect malicious network activities—for example, port scans and DoS attacks—by constantly monitoring network traffic.
network-based intrusion detection system (NIDS)
333
A type of IPS designed to inspect traffic and, based on its configuration or security policy, remove, detain, or redirect malicious traffic.
network-based intrusion prevention system (NIPS)
334
A popular vulnerability scanner.
nmap
335
A random number issued by an authentication protocol that can be used only one time.
nonce
336
The assurance that someone cannot deny the validity of something; where a statement’s author cannot dispute its authorship.
nonrepudiation
337
he capability to avoid or reduce data redundancies and anomalies— a core concept within relational databases.
normalization
338
A simple but practical command-line tool, that is principally used to find the IP address that corresponds to a host or the domain name that corresponds to an IP address.
nslookup
339
A situation that occurs when a program dereferences a pointer that it expects to be valid, but is null, which can cause the application to exit or the system to crash.
null pointer dereference
340
A tool that is used for centralized logging across various platforms and supports a myriad of different log types and formats.
NXLog
341
The complicating of source code to make it more difficult for people to understand. See also camouflage.
obfuscation
342
Removing an employee from a federated identity management system, typically when he or she leaves an organization.
offboarding
343
A dedicated system or application used to crack hashed | or encrypted passwords offline.
offline password cracker
344
Adding a new employee to an organization and to its identity and access management system. This process is associated with user training, federated identity management, and role-based access control (RBAC).
onboarding
345
An alternative to certificate revocation lists (CRLs) that contains less information than a CRL does, and the client side of the communication is less complex. does not require encryption, making it less secure than CRLs.
Online Certificate Status Protocol (OCSP)
346
An application used to crack passwords while interacting with the targeted system.
online password cracker
347
Previously known as man-in-the-middle (MITM) or man-in-thebrowser (MITB) attack, this type of attack intercepts all data between a client and server, sometimes using a Trojan to infect a vulnerable web browser for later nefarious purposes.
on-path attack
348
An implementation profile for storage devices built to protect the confidentiality of stored user data against unauthorized access after it leaves the owner’s control (involving a power cycle and subsequent deauthentication).
Opal
349
Information that can be used for reconnaissance from public records, social media sites, DNS records, and other open sources. It applies to offensive security (ethical hacking/penetration testing) and defensive security
open-source intelligence (OSINT)
350
A nonprofit organization that has chapters all over the world that focus on application and software security. It has numerous well-known and comprehensive projects designed to increase the awareness of secure coding and testing, as well as creating tools to help find and prevent security vulnerabilities.
Open Web Application Security Project (OWASP)
351
A popular SSO protocol for federated systems. In the 2.0 version, the authentication and authorization process is similar to the one in SAML.
OpenID
352
A full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.
OpenSSL
353
This category of controls includes the controls executed by people. They are designed to increase individual and group system security. They include user awareness and training, fault tolerance and disaster recovery plans, incident handling, computer support, baseline configuration development, and environmental security. The people who carry out the specific requirements of these controls must have technical expertise and understand how to implement what management desires of them.
operational controls
354
The term used to describe physical items that can be programmed and connected to a network or the Internet. Typically, these devices are used to control electrical grids, pipelines, automobiles, manufacturing plant robots, and other critical infrastructure.
operational technology (OT)
355
The order in which digital evidence is collected from high | volatility (where data is more vulnerable to loss) to low volatility.
order of volatility
356
A portion of a hard disk or similar media that is reserved as an extension of RAM.
pagefile
357
Penetration test environment where the penetration testers may be provided credentials but not full documentation of the network infrastructure.
partially known environment
358
A type of attack in which, instead of trying to figure out what the user’s password is, the attacker just uses a password hash collected from a compromised system and then uses the same hash to log in to another client or server system. This is done because password hashes cannot be reversed.
pass the hash attack
359
An attacker method that can be carried out by researching information about the victim’s public records, social media sites, and other personal information.
passive reconnaissance
360
A protocol that sends usernames | and passwords in clear text. Obviously, this protocol is insecure and to be avoided.
Password Authentication Protocol (PAP)
361
An application program that is used to identify an unknown or forgotten password to a computer or network resources.
password cracker
362
A technology typically deployed by corporations when implementing two-factor authentication. The primary use case is remote access to the organization’s environment
password keys
363
The practice of reusing the same password or part of it, which consequently increases the risk of password compromise.
password reuse
364
A type of password brute-force attack where the attacker uses a single password against targeted user accounts before performing a second attempt to remain undetected.
password spraying
365
A central system or piece of software that stores and manages various sets of credentials in a secure management system. helps solve the issue of credential storage. has its own set of credentials and possibly another authentication factor that is used to access
password vault
366
The process of keeping up with fixes that address software | bugs
patch management
367
Software bug fixes.
patches
368
A utility that sends packets to each router on the way to a final destination over a period of time and computes results based on the packets that return from each hop.
pathping
369
A standard enacted in 2006 as a joint effort by the credit card industry with the overall goal to enhance the security around payment card data processing. The requirement applies to any organization that processes payment card data and enforces penalties for noncompliance on such organizations.
Payment Card Industry Data Security Standard (PCI DSS)
370
a common format that uses base64-encoded ASCII files and can be identified with the .pem file extension, though the format might also use .crt (for example, Microsoft), .cer, or .key extensions.
PEM Privacy-enhanced Electronic Mail (PEM)
371
The process of analyzing the security posture of a network’s or system’s infrastructure in an effort to identify and possibly exploit any security vulnerabilities found.
penetration testing
372
A feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised.
perfect forward secrecy
373
The act of maintaining a foothold in a compromised system after the exploitation phase in order to perform additional tasks such as installing and/or modifying services to connect back to the compromised system. It is used in a loadbalancing environment, when various mechanisms are used to maintain the preservation of data during transmission between the client and server.
persistence
374
Information used to uniquely identify, contact, or locate a person. This type of information could be a name, birthday, Social Security number, biometric information, and so on.
personally identifiable information (PII)
375
An organization’s system of ensuring employees are who they say they are. The most common type of authentication is the username/ password combination. Usernames are usually based on a person’s real name.
personnel credential policy
376
A type of attack in which an attacker redirects one website’s traffic to another website that is bogus and possibly malicious. The threat actor redirects a victim from a valid website or resource to a malicious one that could be made to appear as the valid site to the user. From there, an attempt is made to extract confidential information from the user or to install malware in the victim’s system.
pharming
377
An attempt at fraudulently obtaining private information, usually done electronically.
phishing
378
A verification system in which a user receives an automated phone call that requires him or her to press a certain button or code.
phone call authentication
379
A physical security system used to control access to organization. It can be considered the first line of defense, sort of like a firewall is the first line of defense for a network. Implementing physical access security methods should be a top priority for an organization. Proper building entrance access and secure access to physical equipment are vital. And anyone coming and going should be logged and surveyed.
physical controls
380
A type of attack in which an unauthorized person tags along with an authorized person to gain entry to a restricted area. Also known as tailgating
piggybacking
381
A TCP/IP command used to verify IP-level connectivity to another TCP/ IP computer by sending Internet Control Message Protocol (ICMP) echo request messages. Corresponding echo reply messages are displayed, along with round-trip times. This command is used to test connectivity between two devices on a network with IPv4
ping
382
A method of adding security to the certificate validation process. You can help detect and block many types of on-path attacks by adding an extra step beyond normal X.509 certificate validation.
pinning
383
A post-exploitation technique, the main goal of which is to move from one device to another to avoid detection, steal sensitive data, and maintain access to these devices to exfiltrate the sensitive data. Also referred to as lateral movement.
pivoting
384
A cloud service that provides various software solutions to organizations, especially the ability to develop applications in a virtual environment without the cost or administration of a physical platform. This model provides everything except applications. Services provided by this model include all phases of the system development lifecycle (SDLC) and can use application programming interfaces (APIs), website portals, or gateway software. These solutions tend to be proprietary, which can cause problems if the customer moves away from the provider’s platform.
platform as a service (PaaS)
385
Linear style electronic checklists of required steps and actions needed to successfully respond to specific incident types or threats.
playbook
386
A security feature present in routers and switches that is used to provide access control by restricting the Media Access Control (MAC) addresses that can be connected to a given port.
port security
387
Configuring one or more ports on a switch to forward all packets to another port. This procedure is often used when capturing packets
port spanning/port mirroring
388
A hardware device utilized to provide access to all traffic on a network segment.
port tap
389
The use of cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer.
post-quantum cryptography
390
A form of spyware that typically | includes grayware, adware, or jokes.
potentially unwanted programs (PUPs)
391
A scripting framework used in Windows operating systems.
PowerShell
392
A machine learning solution to help discover security threats in your network.
predictive analysis
393
Adding a message in an email’s subject line to identify emails that come from outside the organization. You can often configure your email servers or email cloud services to use this technique.
prepending
394
The act of making sure that | digital evidence is acquired, handled, and analyzed properly and without any contamination or modification.
preservation of evidence (evidence preservation)
395
A complex passphrase used to enable connectivity between wireless clients and the WAP. automatically used when you select WPA2- Personal in the Security Mode section.
preshared key (PSK)
396
the act of impersonating or “spoofing” someone else’s | identity.
pretexting
397
Controls that are employed before an event and are designed to prevent an incident. Examples include biometric systems designed to keep unauthorized persons out, NIPSs to prevent malicious activity, and RAID 1 to prevent loss of data. These are also sometimes referred to as deterrent controls.
preventive controls
398
A type of cloud system designed for a particular organization in mind. As security administrator, you have more control over the data and infrastructure. A limited number of people have access to the cloud, and they are usually located behind a firewall of some sort in order to gain access
private cloud
399
The process of elevating the level of authority (privileges) of a compromised user or a compromised application.
privilege escalation
400
A system used to centrally manage access | to privileged accounts. It’s primarily based on the concept of least privilege.
privileged access management (PAM)
401
The environment where your code fulfills its destiny (where users access the final code after all of the updates and testing). When you hear people talk about making their “code go live,” this is the environment they are talking about.
production
402
Running a network interface or system in monitoring mode | only.
promiscuous mode
403
A system designed to deter, detect, and/or make difficult physical access to the communication lines carrying data and/ or voice communications.
protected cable distribution system (PDS)
404
An authentication protocol used to encapsulate Extensible Authentication Protocol (EAP) packets in order to safeguard sensitive data.
Protected Extensible Authentication Protocol (PEAP)
405
Tools that allow network engineers and security teams to capture network traffic and perform analysis on the captured data to identify potential malicious activity or problems with network traffic.
protocol analyzers
406
The establishment of a chain of custody for information that can describe its generation and all subsequent modifications that have led to its current state.
provenance
407
A method of obfuscating sensitive data while not anonymizing the nonsensitive data so that it can be used for other business purposes.
pseudo-anonymization
408
Application and storage space offered to the general public over the Internet by a service provider.
public cloud
409
An entire system of hardware and software, policies and procedures, and people. It is used to create, distribute, manage, store, and revoke digital certificates. If you have connected to a secure website in the past, you have utilized
public key infrastructure (PKI)
410
Information organized into a long chain of blocks. When a buyer and seller engage in a transaction, the blockchain verifies the authenticity of their accounts.
public ledger
411
A data destruction method where paper is first shredded and then reduced to pulp.
pulping
412
Grinding or shredding media and paper multiple times beyond | recognition.
pulverizing
413
A team that integrates the defensive capabilities of a blue team with the adversarial techniques used by the red team. In most cases is not a separate team, but a solid dynamic between the blue and red teams.
purple team
414
When software triggers and provides certain information such as alerts, authentication attempts, updates, or any other notifications to a device (mobile device, laptop, or desktop) without the user deliberately requesting it.
push notifications