Topics Flashcards
(29 cards)
MTBF
Mean time between failures. It is the average time between system breakdowns.
MTTR
Mean time to respond. It is the average time it takes to discover a security threat or incident
RTO
Recovery time objective. It is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
RPO
Recovery point objective. It generally refers to calculating how much data loss a company can experience within a period most relevant to its business before significant harm occurs, from the point of a disruptive event to the last data backup.
SCAP
Security content automation protocol. A multi-purpose framework of specifications supporting automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement.
Examples: Nessus, OpenSCAP, OpenVAS.
CVE
Common vulnerabilities and exposures. The mission of CVE is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
CVSS
Common vulnerability scoring system. It provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.
CPE
FDCC
SAML
IdP
SP
RP
OVAL
tcpdump -w -r -n -e
write, read, network address information in numeric format, option to include the data link (ethernet etc) when performing a packet capture.
Insecure de-serialization vulnerability
When an attacker loads untrusted code into a serialized object, then forwards it to the web application.
Rainbow Attack
Cracking method that uses a special table (a “rainbow” table) to crack the password hashes in a database.
Dictionary Attack
Breaking into a password-protected system by systematically entering every word in a dictionary as a password.
Hybrid Attack
Perpetrator blends two or more kinds of tools to carry out the assault. Example - dictionary + brute force attack = rover123, purple6!, 123Password
Collecting evidence for forensic examination sequence
CPU Cache, RAM, SWAP, Hard Drive
printenv
Linux command. Prints value of environment variable specified. (Like alias etc)
COSO
Committee of sponsoring organizations. Safeguard organization’s assets against fraud.
Serialized Object
Converting state of an object into a byte stream. Can create copies or save state into storage.
De-serialized object
Is the reverse process where the byte stream recreates the actual object in memory.