Shared Flashcard Set

Details

Cybersecurity
Network security, threats
26
Computer Science
Not Applicable
05/04/2017

Additional Computer Science Flashcards

 


 

Cards

Term
FCAPS
Definition

network management model made up of five functional areas:

  1. Fault management
  2. Configuration management
  3. Accounting management
  4. Performance management
  5. Security management
Term
Fault management
Definition
Network management function used to detect, isolate, notify and correct faults encountered in the network. This category analyzes traffic, trends, SNMP polls and alarms for automatic fault detection.
Term
Configuration management
Definition
Network management function used to manage configuration aspects of network devices include configuration file management,
inventory management and software management
Term
Accounting management
Definition
Network management function used to manage usage information of network resources.
Term
Performance management
Definition
Function used to monitor and measure various aspects of network performance metrics so that acceptable performance can be maintained. This includes response time, link utilization and error rates. Administrators can monitor trends and set threshold alarms.
Term
Security management
Definition
network management function provides access to network devices and corporate resources to authorized individuals.
This category focuses on authentication, authorization, firewalls, network segmentation, IDS and notifications of
attempted breaches
Term
PENETRATION TESTING COMMON PHASES
Definition
  1. Planning
  2. Discovery
  3. Attack
  4. Reporting
Term
Vulnerability - Technical Errors
Definition

Vulnerability cause is due to errors in design, implementation, placement or configuration

EXAMPLES:

• Coding errors
• Inadequate passwords
• Open network ports
• Lack of monitoring

Term
Process Vulnerability
Definition

Cause is due to errors in operation

 

EXAMPLES:

• Failure to monitor logs
• Failure to patch software

Term
Organizational Vulnerability
Definition

Cause of vulnerability due to errors in management, decision, planning or from ignorance

 

EXAMPLES:

• Lack of policies
• Lack of awareness
• Failure to implement controls

Term
Vulnerability
Definition
A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events.
Term
Network traffic analysis
Definition
Identifies patterns in network communications. Traffic analysis does not need to have the actual content of the communication but analyzes where traffic is taking place, when and for how long
communications occur and the size of information transferred
Term
Incident
Definition
a violation or imminent threat of violation of computer security policies, acceptable use policies, or
standard security practices
Term
cybersecurity incident
Definition
an adverse event that negatively impacts the confidentiality, integrity and availability of data.These events may also be classified as technical or physical.
Technical incidents include viruses, malware, denial-of-service (DoS) and system failure. Physical incidents may
include social engineering and lost or stolen laptops or mobile devices
Term
Attrition
Definition

An attack that employs brute force methods to compromise, degrade, or destroy systems, networks or services

Example:

  • Denial of service intended to impair or deny access to an application
  • a brute force attack against an authentication mechanism, such as passwords or digital signatures
Term
Web Attack
Definition

An attack executed from a website or web-based
application.

 

EXAMPLE:

  • Cross-site (XSS) scripting attack used to steal credentials, or
  • redirect to a site that exploits a browser vulnerability & installs malware
Term
Email/Phishing Attack
Definition

An attack executed via an email message or attachment.

EXAMPLE:

  • Exploit code disguised as an attached document,
  • or a link to a malicious website in the body of an email message
Term
External/Removable Media Attak
Definition

An attack executed from removable media or a
peripheral device

 

EXAMPLE:
Malicious code spreading onto a system from an
infected flash drive

Term
Spoofing
Definition

Impersonation - An attack involving replacement of legitimate content/services with a malicious substitute

 

EXAMPLE:

Spoofing, man in the middle attacks, rogue wireless
access points and structured query language injection
attacks all involve impersonation

Term
Incident Response Phases
Definition
[image]
Term
System hardening should implement the principle of ____________________ or ____________________
Definition
Least priviledge and access controls
Term
Virtualization
Definition
multiple guests coexisting on the same server in isolation of one another.
Term
Chain of custody
Definition
is a term that refers to documenting, in detail, how evidence is handled and maintained, including its ownership, transfer and modification. This is necessary to satisfy legal requirements that mandate a high level of confidence regarding the integrity of evidence.
Term
What are the 4 major considerations in the chain of events in regards to evidence in digital forensics?
Definition
[image]
Term
APT Characteristics are
Definition
This type of attack is:
1. Well-researched
2. Sophisticated - can exploit multiple vulnerabilities in a single attack
3. Stealthy - often go undetected for months and sometimes years
4. Persistent
Term
Stages of APT Attack
Definition
[image]
Supporting users have an ad free experience!