Study Test A Flashcards
HTTPS
Hypertext Transfer Protocol Secure – Used for secure communication over a network. Used on internet to protect data between user’s computer and website. Uses TLS. (Ex. Online purchases are secure) Port 443 TCP
Hypertext Transfer Protocol over SSL/TLS (HTTPS) provides an encrypted web connection to the router
Hybrid cloud model
Combines both private and public cloud infrastructures
Reconstitution (incident response)
The recovery after a breach, can be a phased approach that may take months to complete
CMS
Content Management System - Used to manage the creation and modification of digital content
802.1X
Authentication protocol, but it needs additional functionality to authenticate across multiple user databases. Centralized authentication server. Provides an authentication framework that allows a user to be authenticated by a central authority. Standard for port-based network access control (PNAC)…RADIUS
A IPS can detect…
If an alert was generated by an embedded script and an attacker’s IP Address
ABAC
Attribute-based Access Control - combines many different parameters to determine if a user has access to a resource based on attributes
Provides the most detailed and explicit type of access control over a resource
Active Reconnaissance
Used to gather info about services on network. Intruder engages with the targeted system to gather info about vulnerabilities Does not exploit vulnerabilities
Administrative Control
Sets a policy that is designed to control how people act
AES
Advanced Encryption Standard - Symmetric block cipher chosen by the U.S. government to protect classified information.
Specification for the encryption of electronic data
Key size can be 128/192/256 bits
Agile development life-cycle
Process of developing code that is rapid and highly-collaborative.
Software development that is performed in small increments to allow more adaptivity and room to change
ALE
Annual Loss Expectancy - is the financial loss over an entire 12-month period
An immutable system
Can’t be changed once deployed
Anti-spoofing
Commonly used with routers to prevent communication from spoofed IP addresses
API
Application Programming Interface - how 2 or more computer programs communicate with each other
ARO
Annual Rate of Occurrence - the number of times an event will occur in a 12-month period
ARP poisoning
Address Resolution Protocol poisoning - often associated with a man-in-the-middle attack. Attacker must be on the same local IP subnet as the victim, so it’s often associated with an external attack
Spoofing attack that hackers use to intercept data…attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network
Backdoor
Allows an attacker to access a system at any time without any user intervention. If there are inbound traffic flows that cannot be identified, it may be necessary to isolate that computer and examine it for signs of a compromised system
Business Impact Analysis
Usually created during the disaster recovery planning process
CA Key
Certificate Authority key - commonly used to validate the digital signature from a trusted CA. Not commonly used for user data encryption
Captive portal
Commonly used on web-based systems as an authentication method
CASB
Cloud Access Security Broker – can be used to apply security policies to cloud-based implementations. Management software designed to mediate access to cloud services by users across all devices. Provide visibility into how clients and other network nodes use cloud services
CHAP
Challenge-Handshake Authentication Protocol - combines a server’s challenge message with the client’s password hash during the authentication process
Community cloud model
Resources and costs are shared among several different organizations who have common service needs