Random Stuff I need to learn Flashcards
PAP
Password Authentication Protocol (PAP) - Username and password
TCP & UDP
Transmission Control Protocol & User Datagram Protocol
Layer 4
Enables different types of data transmission from a network source to the destination. TCP is more reliable, while UDP prioritizes speed and efficiency
ICMP
Internet Control Message Protocol
Error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets
Reports on network congestion and reachability. Utilities such as ping and tracert use ICMP as their transport mechanism
NOT a transport protocol
Server Clusters
Server clusters include two or more servers working together to offer services
NAT
Network Address Translation
Used in routers. Maps multiple local private addresses to a public one before transferring the information
Translate a set of IP addresses to another set of IP addresses
RAID 0
Provides data STRIPING across multiple disks to increase performance. Focused on speed and performance. Atleast 2 hard drives
RAID 1
Provides redundancy by MIRRORING the data identically to 2 hard drives. Atleast 2 hard drives
RAID 5
Provides redundancy by STRIPING data and PARITY data across the disk drives. Requires at least of 3 disk drives
RAID 6
Provides redundancy by STRIPING and DOUBLE PARITY data across the disk drives. Requires at least 4 hard disks
RAID 10
Creates a striped RAID of two mirrored RAIDs (combines RAID 1 & RAID 0)
Bluejacking
The sending of unsolicited messages to Bluetooth enabled devices (sends info)
Bluesnarfing
Unauthorized access of info from a wireless device over Bluetooth (takes info)
XSS/CSS
Cross-Site Scripting
When malicious code is inserted into the website
XSRF/CSRF
Cross-Site Reference Forgery
When an attacker forces a user to execute actions on a web server that they are already authenticated (logged into)
Daemons
Computer program that runs as a background process, rather than being under the direct control of an interactive user
SCADA
Supervisory Control and Data Acquisition - Type of ICS (Industrial Control System) that manages large-scale, multi-site devices and equipment spread over a geographic region.
Commonly used in manufacturing companies
SNMP
Simple Network Management Protocol - A TCP protocol that aids in monitoring network attached devices and computers
Provides info about memory & CPU usage and other device details. Port 161 UDP
Data Sovereignty
The legal concept that says data is subject to the laws of the country where it is stored
Applicable laws and regulations based on the physical location of digital data.
Legal Hold
Process designed to preserve all relevant information when litigation (lawsuit) is reasonably expected to occur
The legally required implementation of evidence preservation
Chain of Custody
Requires evidence to be gathered in a legal manner, documented, and securely stored at all time
The process of handling evidence so that it is admissible in court. Evidence should be labeled, locked away when not in use, and if it is transferred to someone else it needs to be documented who and when.
Chain of custody forms list every person who’s worked with or who has touched the evidence that is a part of an investigation
PKI
Public Key Infrastructure
A group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Allows users to communicate securely without personally knowing one another
Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications
A hierarchy of digital security certificates
Entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption
Logic Bomb
Malicious code that is embedded into a system and may only be activated when certain conditions are met, like timers or system events
Smash the Stack
Occurs when an attacker fills up the buffer with NOP so that the return address may hit a NOP and continue on until it finds the attacker’s code to run
RPs
Provide services to members of a federation