Network and Server Vulnerability Flashcards

1
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISMS

A

Information Security Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Profiling

A

Network profiling is the process of capturing, understanding, and characterising the typical behaviour of a network over time. It involves establishing a baseline, which is a statistical representation of the network’s standard operation at any given point in time. Once this baseline is established, any significant deviation from it might be indicative of potential issues, anomalies, or security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Profile Elements

A
  • Session duration (The time between the establishment of a data flow and its termination)
  • Total Throughput (Amount of data passing from a given source to a given destination in a given period of time)
  • Ports Used (A list of TCP or UDP processes that are available to accept data)
  • Critical Asset Address Space (The IP addresses or the logical location of essential systems or dat)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Server Profiling

A

Server profiling is used to establish the accepted operating state of servers. A server profile is a security baseline for a given server. It establishes the network, user, and application parameters that are accepted for a specific server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Server profile Elements

A
  • Listening ports (The TCP and UDP daemons and ports that are allowed to be open on the server)
  • Logged-in users and accounts (The parameters defining user access and behaviour)
  • Service accounts (The type of services an application is allowed to run)
  • Software environment (The tasks, processes and applications that are permitted to run on the server)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NBA

A

Network Behaviour Analysis
the analysis of this diverse, unstructured data using Big Data analytics techniques to detect network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly