Topics Flashcards

(29 cards)

1
Q

MTBF

A

Mean time between failures. It is the average time between system breakdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MTTR

A

Mean time to respond. It is the average time it takes to discover a security threat or incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RTO

A

Recovery time objective. It is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPO

A

Recovery point objective. It generally refers to calculating how much data loss a company can experience within a period most relevant to its business before significant harm occurs, from the point of a disruptive event to the last data backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SCAP

A

Security content automation protocol. A multi-purpose framework of specifications supporting automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement.

Examples: Nessus, OpenSCAP, OpenVAS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVE

A

Common vulnerabilities and exposures. The mission of CVE is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CVSS

A

Common vulnerability scoring system. It provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDCC

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IdP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OVAL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tcpdump -w -r -n -e

A

write, read, network address information in numeric format, option to include the data link (ethernet etc) when performing a packet capture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insecure de-serialization vulnerability

A

When an attacker loads untrusted code into a serialized object, then forwards it to the web application.

17
Q

Rainbow Attack

A

Cracking method that uses a special table (a “rainbow” table) to crack the password hashes in a database.

18
Q

Dictionary Attack

A

Breaking into a password-protected system by systematically entering every word in a dictionary as a password.

19
Q

Hybrid Attack

A

Perpetrator blends two or more kinds of tools to carry out the assault. Example - dictionary + brute force attack = rover123, purple6!, 123Password

20
Q

Collecting evidence for forensic examination sequence

A

CPU Cache, RAM, SWAP, Hard Drive

21
Q

printenv

A

Linux command. Prints value of environment variable specified. (Like alias etc)

22
Q

COSO

A

Committee of sponsoring organizations. Safeguard organization’s assets against fraud.

23
Q

Serialized Object

A

Converting state of an object into a byte stream. Can create copies or save state into storage.

24
Q

De-serialized object

A

Is the reverse process where the byte stream recreates the actual object in memory.

25
Non-Primitive Data types
Strings, arrays, user defined classes. Created by programmer and is not defined in language.
26
Anomaly-based detection
Prescribes the baseline for expected patterns based on its observation of what normal looks like. ## Footnote If large sums of money are spent one after another in one day and it is not your typical behavior, a bank can block your card.
27
Trend-Analysis
Not used for detection, but instead to better understand capacity and the system's normal baseline.
28
Heuristic-Analysis
Determines whether several observed data points constitute an indicator and whether related indicators make up an incident depending on a good understanding of the relationship between the observed indicators. Method of detecting viruses by examining code for suspicious properties. Malware-like behavior patterns. ## Footnote Heuristic-Analysis example: scans potential malware to find suspicious properties like junk-code or use of uncommon API's. Sometimes uses signature based detection
29
Behavior-based detection
(Statistical or profile-based detection) means that the engine is trained to recognize baseline traffic or expected events associated with a user account or network device. Anything that deviates from the baseline (outside a level of tolerance) generates an alert. Records expected patterns concerning the entity being monitored like user logins. ## Footnote Examines results of something happening or potentially happening. Views results of a program for susicious activity. Disabling anti-virus, installing rootkits, deleting altering or adding system files. Might execute malware in sandbox environment before it can actually execute the behavior.