Sound the Alarm: Detection and Response: Module 2 Flashcards
(20 cards)
Command And Control (C2)
Ways attackers stay connected to hacked systems
Command-Line Interface (CLI)
A text screen where you type commands
Data Exfiltration
Stealing data from a system
Data Packet
A small piece of data sent across a network
Indicators Of Compromise (IoC)
Signs that a system may be under attack
Internet Protocol (IP)
Rules for sending data between devices
Intrusion Detection Systems (IDS)
Tool that watches for and alerts on attacks
Media Access Control (MAC) Address
A unique ID for each network device
National Institute Of Standards And Technology (NIST) Incident Response Lifecycle
A 4-step guide for handling security incidents
Network Data
Information sent between devices
Network Protocol Analyzer (Packet Sniffer)
Tool that reads network traffic
Network Traffic
Data moving across a network
Network Interface Card (NIC)
Hardware that connects a device to a network
Packet Capture (P-Cap)
File with saved network data
Packet Sniffing
Looking at network data
Playbook
Step-by-step instructions for tasks
Root User (Or Superuser)
User with full system control
Sudo
Command to temporarily gain full access
Tcpdump
Command-line tool to read network traffic
Wireshark
Graphical tool to read network traffic