Incorrect Domains Flashcards
Worms
“Replicate” and “Spread”
.12
Fileless Scripts
executing malicious activity while legit programs run.
Memory based not file based
1.2
Logic Bomb
if discovered its already too late
1.2
Rootkit
- Distributed privilege access for a remote user which gives them admin privileges
1.2
Rainbow Table
Rebuilt set of hashes used to crack a password
1.3
Salting
adding additional random data to the password to prevent rainbow table
1.3
Skimming
attaching a fake scanner to a POS system
1.4
Criminal Syndicates
Financial backing and a structure threat conducted over a long period of time
1.5
Shadow IT
The use of IT, devices and sopftware without explicit IT department approval, often done with good intentions
1.5
Adversaries
government funded agencies
1.7
Bulletins
released by vendors or private companies
1.7
False Negative
When there is a vulnerability, but the scanner does not detect it
1.8
Credentialed scan
spots vulnerabilities like non expiring passwords
1.8
True Positive
results of the system scan agree with the manual inspection
1.8
non credentialed scan
Lower privileges than a credentialed scan. find missing patches and some protocol vulnerabilities
1.8
Intrusive Scan
try to exploit vulnerability and should be done in a sandbox
1.8
SIEM
Security Information Event Management
provides real time monitoring, analysis, correlation and notification of potential attacks
Built in log collector like syslog
1.8
SOAR
centralized alert and response automation with threat specific playbooks
1.8
Dashboard
SIEM typically includes a dashboard and collects reports that can be reviewed regularly to ensure that the polices have been enforced and the environment is compliant
1.8
UEBA
User Entity Behavior Analysis
based on the interaction of the user that focuses on their identity data that they would normally access on a normal day
Tracks devices that the user normally uses and the servers that they normally visit
1.8
Pivoting
a compromised system is used to attack another system on the same network
1.8
IaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
Ex. Azure Virutal Machines
2.2 Summarize Virtualization and Cloud Computing Concepts
PaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
- OS
- Middleware
- Runtime
Customer is responsible for deployment and management of apps
CSP manages provisioning of configuration, hardware, and OS
Ex. Azure SQL database, API management
2.2 Summarize Virtualization and Cloud Computing Concepts
SaaS
Cloud Service Provider responsible for
- Virtualization
- Servers
- Storage
- Networking
- OS
- Middleware
- Runtime
Customer just configures features. Limited shared responsibility for Applications and Data
CSP responsible for management, operation, and service availability
Office365, SalesForce
2.2 Summarize Virtualization and Cloud Computing Concepts