Term
Protocol Analyzer (Sniffer) |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
External User Secure Access Over VPN to company Access External Resources directly |
|
|
Term
|
Definition
Identifying machines that don't belong on the network Malicious hackers Ethernet Jacking |
|
|
Term
|
Definition
Check an IP address or range of IP's for open ports |
|
|
Term
|
Definition
Fingerprints what type of OS, applications and services |
|
|
Term
|
Definition
-Traffic can be examined in real-time -Closer to the point of entry into the network -Access provide using Telnet, SSH, etc -Less to manage/Reconfigure when inserting into the network |
|
|
Term
Out-of-Band Access Control |
|
Definition
-More reactive in nature vs real-time -Requires additional design/redesign work -Requires additional upstream components to provide similar security -Endpoint compliance not as granular -Saves trip to data center |
|
|
Term
|
Definition
-Separate Interface for management network -Used for lights out management -Monitoring and audit logging -Use to patch install OS or troubleshoot a host that is offline or won't boot |
|
|
Term
Popular Wireless Scanners / Crackers |
|
Definition
-Airsnort -Airjack -WEPcrack -Netstumbler -kismet -ASLEAP -Ethereal -IKECrack |
|
|
Term
Wireless Scanner Cracking Tools |
|
Definition
-Crack WPA and WEP -Find hidden WiFi network -DoS attacks -MiTM attacks |
|
|
Term
|
Definition
-Events that aren't really incidents -Anomalies that deviate from normal behavior |
|
|
Term
False Positive Corrections |
|
Definition
-Can create excess work or minimize attention when real incidents occur |
|
|
Term
|
Definition
-Incident was not recognized -COntrols not configured properly -Operator error |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Arriving at the right conclusion for the wrong reason |
|
|
Term
|
Definition
-Nessus -REtina -NMAP -SAINT |
|
|
Term
|
Definition
-Intermediary system that typically sits between a user and a content provider -Caching, Filtering, Captive Portal |
|
|
Term
|
Definition
-Metasploit -CANVAS -Core Impact - First Fully AUtomated -RouterSploit - |
|
|
Term
|
Definition
-Hard disk Overwrite the data multiple time -SSD Resets the NAND and marks all blocks as empty -SSD vendor tools |
|
|
Term
|
Definition
-Samsung Magician -INtel Solid State Toolbox -Corsair SSD Toolbox -SANDisk SSD Toolbox -OCZ Toolbox -Parted Magic |
|
|
Term
Department of Defense Data Sanitization Standard |
|
Definition
|
|
Term
CSEC (Communication Security Establishment Canada) Data Sanitization Standard |
|
Definition
|
|
Term
|
Definition
-AP with everything required to service clients -Limited Encryption -Updates done individually -No Load Balancing |
|
|
Term
|
Definition
WAP with Enterprise features Managed Centrally Centralized patching Scales well |
|
|
Term
|
Definition
Hiding a document inside of another document |
|
|
Term
Popular Steganography Tools |
|
Definition
XIAO IMAGE Steghide Crypture OpenStego |
|
|
Term
|
Definition
Used to provide information about a service running on a particular port |
|
|
Term
|
Definition
-DOn't interact directly with the hosts -Gather information and report externally -Packet captures/sniffers -Not usually visible ot the host or administrators |
|
|
Term
|
Definition
Penetration Testing Port Scanners Honeypots/honeynets Banner Grabbing Visible to the host and administrators |
|
|